Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-8963 (GCVE-0-2015-8963)
Vulnerability from cvelistv5
Published
2016-11-16 04:49
Modified
2024-10-15 19:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:36:31.105Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "94207", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94207" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2015-8963", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-05T18:39:59.392623Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-15T19:01:34.663Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "shortName": "google_android" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "94207", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94207" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2015-8963", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373" }, { "name": "http://source.android.com/security/bulletin/2016-11-01.html", "refsource": "CONFIRM", "url": "http://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "94207", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94207" }, { "name": "https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373" } ] } } } }, "cveMetadata": { "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "assignerShortName": "google_android", "cveId": "CVE-2015-8963", "datePublished": "2016-11-16T04:49:00", "dateReserved": "2016-10-03T00:00:00", "dateUpdated": "2024-10-15T19:01:34.663Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-8963\",\"sourceIdentifier\":\"security@android.com\",\"published\":\"2016-11-16T05:59:02.890\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.\"},{\"lang\":\"es\",\"value\":\"Condici\u00f3n de carrera en la funcionalidad kernel/events/core.c en el kernel de Linux en versiones anteriores a 4.4 permite a los usuarios locales obtener privilegios o provocar una denegaci\u00f3n de servicio al utilizar un manejo incorrecto de una estructura de datos de swevent durante una operaci\u00f3n de desenchufado de la CPU.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:C/I:C/A:C\",\"baseScore\":7.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":4.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"},{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"},{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.2.85\",\"matchCriteriaId\":\"9A5A178A-A60C-4053-AEE0-5164430206AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.3\",\"versionEndExcluding\":\"3.16.40\",\"matchCriteriaId\":\"6C5B0F97-B38C-412B-93E9-148AC6F6B58E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.17\",\"versionEndExcluding\":\"3.18.54\",\"matchCriteriaId\":\"56806170-9BCD-4160-A14A-558EFAB98EC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.19\",\"versionEndExcluding\":\"4.4\",\"matchCriteriaId\":\"2E5A3570-BCD5-4B21-89DF-F509EBA1A032\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373\",\"source\":\"security@android.com\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"http://source.android.com/security/bulletin/2016-11-01.html\",\"source\":\"security@android.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/94207\",\"source\":\"security@android.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373\",\"source\":\"security@android.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"http://source.android.com/security/bulletin/2016-11-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/94207\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"cna\": {\"affected\": [{\"product\": \"n/a\", \"vendor\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"datePublic\": \"2016-04-27T00:00:00\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.\"}], \"problemTypes\": [{\"descriptions\": [{\"description\": \"n/a\", \"lang\": \"en\", \"type\": \"text\"}]}], \"providerMetadata\": {\"dateUpdated\": \"2016-11-25T19:57:01\", \"orgId\": \"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6\", \"shortName\": \"google_android\"}, \"references\": [{\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://source.android.com/security/bulletin/2016-11-01.html\"}, {\"name\": \"94207\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"], \"url\": \"http://www.securityfocus.com/bid/94207\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373\"}], \"x_legacyV4Record\": {\"CVE_data_meta\": {\"ASSIGNER\": \"security@android.com\", \"ID\": \"CVE-2015-8963\", \"STATE\": \"PUBLIC\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"product_name\": \"n/a\", \"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}}]}, \"vendor_name\": \"n/a\"}]}}, \"data_format\": \"MITRE\", \"data_type\": \"CVE\", \"data_version\": \"4.0\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"n/a\"}]}]}, \"references\": {\"reference_data\": [{\"name\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373\", \"refsource\": \"CONFIRM\", \"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373\"}, {\"name\": \"http://source.android.com/security/bulletin/2016-11-01.html\", \"refsource\": \"CONFIRM\", \"url\": \"http://source.android.com/security/bulletin/2016-11-01.html\"}, {\"name\": \"94207\", \"refsource\": \"BID\", \"url\": \"http://www.securityfocus.com/bid/94207\"}, {\"name\": \"https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373\", \"refsource\": \"CONFIRM\", \"url\": \"https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373\"}]}}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-06T08:36:31.105Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://source.android.com/security/bulletin/2016-11-01.html\"}, {\"name\": \"94207\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/bid/94207\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373\"}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2015-8963\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-02-05T18:39:59.392623Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-362\", \"description\": \"CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-15T18:29:04.627Z\"}}]}", "cveMetadata": "{\"assignerOrgId\": \"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6\", \"assignerShortName\": \"google_android\", \"cveId\": \"CVE-2015-8963\", \"datePublished\": \"2016-11-16T04:49:00\", \"dateReserved\": \"2016-10-03T00:00:00\", \"dateUpdated\": \"2024-10-15T19:01:34.663Z\", \"state\": \"PUBLISHED\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
ghsa-m878-6q5c-p7qv
Vulnerability from github
Published
2022-05-17 03:43
Modified
2022-05-17 03:43
Severity ?
VLAI Severity ?
Details
Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.
{ "affected": [], "aliases": [ "CVE-2015-8963" ], "database_specific": { "cwe_ids": [ "CWE-362" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-11-16T05:59:00Z", "severity": "HIGH" }, "details": "Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.", "id": "GHSA-m878-6q5c-p7qv", "modified": "2022-05-17T03:43:36Z", "published": "2022-05-17T03:43:36Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8963" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373" }, { "type": "WEB", "url": "http://source.android.com/security/bulletin/2016-11-01.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/94207" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2015-8963
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2015-8963", "description": "Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.", "id": "GSD-2015-8963", "references": [ "https://www.suse.com/security/cve/CVE-2015-8963.html", "https://ubuntu.com/security/CVE-2015-8963" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-8963" ], "details": "Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.", "id": "GSD-2015-8963", "modified": "2023-12-13T01:20:03.709591Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2015-8963", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373" }, { "name": "http://source.android.com/security/bulletin/2016-11-01.html", "refsource": "CONFIRM", "url": "http://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "94207", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94207" }, { "name": "https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A5A178A-A60C-4053-AEE0-5164430206AD", "versionEndExcluding": "3.2.85", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C5B0F97-B38C-412B-93E9-148AC6F6B58E", "versionEndExcluding": "3.16.40", "versionStartIncluding": "3.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "56806170-9BCD-4160-A14A-558EFAB98EC8", "versionEndExcluding": "3.18.54", "versionStartIncluding": "3.17", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E5A3570-BCD5-4B21-89DF-F509EBA1A032", "versionEndExcluding": "4.4", "versionStartIncluding": "3.19", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation." }, { "lang": "es", "value": "Condici\u00f3n de carrera en la funcionalidad kernel/events/core.c en el kernel de Linux en versiones anteriores a 4.4 permite a los usuarios locales obtener privilegios o provocar una denegaci\u00f3n de servicio al utilizar un manejo incorrecto de una estructura de datos de swevent durante una operaci\u00f3n de desenchufado de la CPU." } ], "id": "CVE-2015-8963", "lastModified": "2023-12-14T14:06:01.427", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-11-16T05:59:02.890", "references": [ { "source": "security@android.com", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373" }, { "source": "security@android.com", "tags": [ "Third Party Advisory" ], "url": "http://source.android.com/security/bulletin/2016-11-01.html" }, { "source": "security@android.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94207" }, { "source": "security@android.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373" } ], "sourceIdentifier": "security@android.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" }, { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
fkie_cve-2015-8963
Vulnerability from fkie_nvd
Published
2016-11-16 05:59
Modified
2025-04-12 10:46
Severity ?
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.
References
▶ | URL | Tags | |
---|---|---|---|
security@android.com | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373 | Patch, Third Party Advisory, Vendor Advisory | |
security@android.com | http://source.android.com/security/bulletin/2016-11-01.html | Third Party Advisory | |
security@android.com | http://www.securityfocus.com/bid/94207 | Third Party Advisory, VDB Entry | |
security@android.com | https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373 | Patch, Third Party Advisory, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://source.android.com/security/bulletin/2016-11-01.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/94207 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A5A178A-A60C-4053-AEE0-5164430206AD", "versionEndExcluding": "3.2.85", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C5B0F97-B38C-412B-93E9-148AC6F6B58E", "versionEndExcluding": "3.16.40", "versionStartIncluding": "3.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "56806170-9BCD-4160-A14A-558EFAB98EC8", "versionEndExcluding": "3.18.54", "versionStartIncluding": "3.17", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E5A3570-BCD5-4B21-89DF-F509EBA1A032", "versionEndExcluding": "4.4", "versionStartIncluding": "3.19", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation." }, { "lang": "es", "value": "Condici\u00f3n de carrera en la funcionalidad kernel/events/core.c en el kernel de Linux en versiones anteriores a 4.4 permite a los usuarios locales obtener privilegios o provocar una denegaci\u00f3n de servicio al utilizar un manejo incorrecto de una estructura de datos de swevent durante una operaci\u00f3n de desenchufado de la CPU." } ], "id": "CVE-2015-8963", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2016-11-16T05:59:02.890", "references": [ { "source": "security@android.com", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373" }, { "source": "security@android.com", "tags": [ "Third Party Advisory" ], "url": "http://source.android.com/security/bulletin/2016-11-01.html" }, { "source": "security@android.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94207" }, { "source": "security@android.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12ca6ad2e3a896256f086497a7c7406a547ee373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://source.android.com/security/bulletin/2016-11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94207" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373" } ], "sourceIdentifier": "security@android.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" }, { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-362" }, { "lang": "en", "value": "CWE-416" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
suse-su-2017:0407-1
Vulnerability from csaf_suse
Published
2017-02-06 14:41
Modified
2017-02-06 14:41
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 rt-kernel was updated to 3.12.69 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2015-8962: Fixed a double free vulnerability in the SCSI subsystem that allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) (bnc#1010501).
- CVE-2015-8963: Fixed a race condition in kernel/events/core.c that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1010502).
- CVE-2015-8964: Fixed a bug in the tty_set_termios_ldisc function that allowed local users to obtain sensitive information from kernel memory (bnc#1010507).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) (bnc#1017710).
- CVE-2016-7910: Fixed a use-after-free vulnerability in the block subsystem that allowed local users to gain privileges (bnc#1010716).
- CVE-2016-7911: Fixed a race condition in the get_task_ioprio function that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1010711).
- CVE-2016-7913: Fixed a bug in the xc2028_set_config function that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1010478).
- CVE-2016-7914: The assoc_array_insert_into_terminal_node function did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) (bnc#1010475).
- CVE-2016-8399: Fixed a bug in the kernel networking subsystem that could have enabled a local malicious application to execute arbitrary code within the context of the kernel. (bnc#1014746).
- CVE-2016-8632: The net subsystem did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) (bnc#1008831).
- CVE-2016-8633: The firewire subsystem allowed remote attackers to execute arbitrary code via crafted fragmented packets in certain unusual hardware configurations (bnc#1008833).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) (bnc#1009969).
- CVE-2016-8655: Fixed a race condition in the network subsystem that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1012754).
- CVE-2016-9083: The PCI subsystem local users to bypass integer overflow checks and cause a denial of service (memory corruption) or have unspecified other impact (bnc#1007197).
- CVE-2016-9084: The PCI subsystem misused the kzalloc() function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact (bnc#1007197).
- CVE-2016-9555: Fixed a bug in the network subsystem that allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-9576: The block subsystem did not properly restrict the type of iterator, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) (bnc#1013604).
- CVE-2016-9756: The kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory (bnc#1013038).
- CVE-2016-9793: The net subsystem mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact (bnc#1013531).
- CVE-2016-9794: Fixed a race condition in the ALSA subsystem that allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact (bnc#1013533).
- CVE-2016-9806: Fixed a race condition in the netlink_dump() function which could have allowed local users to cause a denial of service (double free) or possibly have unspecified other impact (bnc#1013540).
- CVE-2017-2583: kvm: x86: fixed emulation of 'MOV SS, null selector' (bsc#1020602).
- CVE-2017-2584: arch: x86: kvm: fixed a bug that could have allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) (bnc#1019851).
- CVE-2017-5551: tmpfs: Fixed a bug that could have allowed users to set setgid bits on files they don't down. (bsc#1021258, CVE-2017-5551).
The following non-security bugs were fixed:
- 8250_pci: Fix potential use-after-free in error path (bsc#1013001).
- block_dev: do not test bdev->bd_contains when it is not stable (bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- bnx2i/bnx2fc : fix randconfig error in next-20140909 (bsc#922052 bsc#922056).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- bnx2x: fix lockdep splat (bsc#922052 bsc#922056).
- btrfs: Ensure proper sector alignment for btrfs_free_reserved_data_space (bsc#1005666).
- btrfs: Export and move leaf/subtree qgroup helpers to qgroup.c (bsc#983087).
- btrfs: Revert 'do not delay inode ref updates during log replay' (bsc#987192).
- btrfs: bugfix: handle FS_IOC32_{GETFLAGS,SETFLAGS,GETVERSION} in btrfs_ioctl (bsc#1018100).
- btrfs: do not delay inode ref updates during log replay (bsc#987192).
- btrfs: fix incremental send failure caused by balance (bsc#985850).
- btrfs: fix relocation incorrectly dropping data references (bsc#990384).
- btrfs: increment ctx->pos for every emitted or skipped dirent in readdir (bsc#981709).
- btrfs: qgroup: Fix qgroup data leaking by using subtree tracing (bsc#983087).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).
- btrfs: send, do not bug on inconsistent snapshots (bsc#985850).
- cpufreq: intel_pstate: Fix divide by zero on Knights Landing (KNL) (bsc#1008876).
- cpuset: fix sched_load_balance that was accidentally broken in a previous update (bsc#1010294).
- ext4: fix data exposure after a crash (bsc#1012985).
- fs/dcache: move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).
- fuse: do not use iocb after it may have been freed (bsc#1012985).
- hpilo: Add support for iLO5 (bsc#999101).
- ib/core: Avoid unsigned int overflow in sg_alloc_table (bsc#924381 bsc#921338).
- ib/mlx5: Fix FW version diaplay in sysfs (bnc#923036).
- ib/mlx5: Fix entries check in mlx5_ib_resize_cq (bnc#858727).
- ib/mlx5: Fix entries checks in mlx5_ib_create_cq (bnc#858727).
- ib/mlx5: Remove per-MR pas and dma pointers (bnc#923036).
- ibmveth: calculate gso_segs for large packets (bsc#1019148).
- ibmveth: check return of skb_linearize in ibmveth_start_xmit (bsc#1019148).
- ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).
- ibmveth: set correct gso_size and gso_type (bsc#1019148).
- igb: Fix oops caused by missing queue pairing (bnc#857394).
- ipmi_si: create hardware-independent softdep for ipmi_devintf (bsc#1009062).
- ipr: Enable SIS pipe commands for SIS-32 devices (bsc#1016961).
- ipv4: Fix ip_queue_xmit to pass sk into ip_local_out_sk (bsc#938963).
- kabi: protect __sk_mem_reclaim (kabi).
- kabi: protect struct perf_event_context (kabi).
- kabi: reintroduce sk_filter (kabi).
- kernel: remove broken memory detection sanity check (bnc#1008567, LTC#148072).
- kgr: ignore zombie tasks during the patching (bnc#1008979).
- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612).
- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410).
- net/mlx5: Avoid passing dma address 0 to firmware (bnc#858727).
- net/mlx5: Fix typo in mlx5_query_port_pvlc (bnc#923036).
- net/mlx5e: Do not modify CQ before it was created (bnc#923036).
- net/mlx5e: Do not try to modify CQ moderation if it is not supported (bnc#923036).
- net/mlx5e: Fix MLX5E_100BASE_T define (bnc#923036).
- net/mlx5e: Remove wrong poll CQ optimization (bnc#923036).
- netback: correct array index (bsc#983348).
- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nfsv4: Fix 'NFS Lock reclaim failed' errors (bsc#1014410).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- posix_acl: Fixup acl reference leak and missing conversions in ext3, gfs2, jfs, hfsplus.
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).
- proc: avoid including 'mountproto=' with no protocol in /proc/mounts (bsc#1019260).
- raid1: ignore discard error (bsc#1017164).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm/kernel-spec-macros: Fix the check if there is no rebuild counter (bsc#1012060)
- rpm/kernel-spec-macros: Ignore too high rebuild counter (bsc#1012060)
- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013001).
- sfc: clear napi_hash state when copying channels (bsc#923037).
- sfc: fix potential stack corruption from running past stat bitmask (bsc#923037).
- sfc: on MC reset, clear PIO buffer linkage in TXQs (bnc#856380).
- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
- target: Make EXTENDED_COPY 0xe4 failure return COPY TARGET DEVICE NOT REACHABLE (bsc#991273).
- target: add XCOPY target/segment desc sense codes (bsc#991273).
- target: bounds check XCOPY segment descriptor list (bsc#991273).
- target: bounds check XCOPY total descriptor list length (bsc#991273).
- target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).
- target: check for XCOPY parameter truncation (bsc#991273).
- target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense (bsc#991273).
- target: simplify XCOPY wwn->se_dev lookup helper (bsc#991273).
- target: support XCOPY requests without parameters (bsc#991273).
- target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).
- target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#921778).
- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).
- x86/apic: Order irq_enter/exit() calls correctly vs. ack_APIC_irq() (bsc#1013479).
- xen/ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- xenbus: correctly signal errors from xenstored_local_init() (luckily none so far).
- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).
- xfs: refactor xlog_recover_process_data() (bsc#1019300).
Patchnames
SUSE-SLE-RT-12-SP1-2017-202
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 rt-kernel was updated to 3.12.69 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2015-8962: Fixed a double free vulnerability in the SCSI subsystem that allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) (bnc#1010501).\n- CVE-2015-8963: Fixed a race condition in kernel/events/core.c that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1010502).\n- CVE-2015-8964: Fixed a bug in the tty_set_termios_ldisc function that allowed local users to obtain sensitive information from kernel memory (bnc#1010507).\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) (bnc#1017710).\n- CVE-2016-7910: Fixed a use-after-free vulnerability in the block subsystem that allowed local users to gain privileges (bnc#1010716).\n- CVE-2016-7911: Fixed a race condition in the get_task_ioprio function that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1010711).\n- CVE-2016-7913: Fixed a bug in the xc2028_set_config function that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1010478).\n- CVE-2016-7914: The assoc_array_insert_into_terminal_node function did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) (bnc#1010475).\n- CVE-2016-8399: Fixed a bug in the kernel networking subsystem that could have enabled a local malicious application to execute arbitrary code within the context of the kernel. (bnc#1014746).\n- CVE-2016-8632: The net subsystem did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) (bnc#1008831).\n- CVE-2016-8633: The firewire subsystem allowed remote attackers to execute arbitrary code via crafted fragmented packets in certain unusual hardware configurations (bnc#1008833).\n- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) (bnc#1009969).\n- CVE-2016-8655: Fixed a race condition in the network subsystem that allowed local users to gain privileges or cause a denial of service (use-after-free) (bnc#1012754).\n- CVE-2016-9083: The PCI subsystem local users to bypass integer overflow checks and cause a denial of service (memory corruption) or have unspecified other impact (bnc#1007197).\n- CVE-2016-9084: The PCI subsystem misused the kzalloc() function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact (bnc#1007197).\n- CVE-2016-9555: Fixed a bug in the network subsystem that allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).\n- CVE-2016-9576: The block subsystem did not properly restrict the type of iterator, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) (bnc#1013604).\n- CVE-2016-9756: The kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory (bnc#1013038).\n- CVE-2016-9793: The net subsystem mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact (bnc#1013531).\n- CVE-2016-9794: Fixed a race condition in the ALSA subsystem that allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact (bnc#1013533).\n- CVE-2016-9806: Fixed a race condition in the netlink_dump() function which could have allowed local users to cause a denial of service (double free) or possibly have unspecified other impact (bnc#1013540).\n- CVE-2017-2583: kvm: x86: fixed emulation of \u0027MOV SS, null selector\u0027 (bsc#1020602).\n- CVE-2017-2584: arch: x86: kvm: fixed a bug that could have allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) (bnc#1019851).\n- CVE-2017-5551: tmpfs: Fixed a bug that could have allowed users to set setgid bits on files they don\u0027t down. (bsc#1021258, CVE-2017-5551).\n\nThe following non-security bugs were fixed:\n\n- 8250_pci: Fix potential use-after-free in error path (bsc#1013001).\n- block_dev: do not test bdev-\u003ebd_contains when it is not stable (bsc#1008557).\n- bna: Add synchronization for tx ring (bsc#993739).\n- bnx2i/bnx2fc : fix randconfig error in next-20140909 (bsc#922052 bsc#922056).\n- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).\n- bnx2x: fix lockdep splat (bsc#922052 bsc#922056).\n- btrfs: Ensure proper sector alignment for btrfs_free_reserved_data_space (bsc#1005666).\n- btrfs: Export and move leaf/subtree qgroup helpers to qgroup.c (bsc#983087).\n- btrfs: Revert \u0027do not delay inode ref updates during log replay\u0027 (bsc#987192).\n- btrfs: bugfix: handle FS_IOC32_{GETFLAGS,SETFLAGS,GETVERSION} in btrfs_ioctl (bsc#1018100).\n- btrfs: do not delay inode ref updates during log replay (bsc#987192).\n- btrfs: fix incremental send failure caused by balance (bsc#985850).\n- btrfs: fix relocation incorrectly dropping data references (bsc#990384).\n- btrfs: increment ctx-\u003epos for every emitted or skipped dirent in readdir (bsc#981709).\n- btrfs: qgroup: Fix qgroup data leaking by using subtree tracing (bsc#983087).\n- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).\n- btrfs: send, do not bug on inconsistent snapshots (bsc#985850).\n- cpufreq: intel_pstate: Fix divide by zero on Knights Landing (KNL) (bsc#1008876).\n- cpuset: fix sched_load_balance that was accidentally broken in a previous update (bsc#1010294).\n- ext4: fix data exposure after a crash (bsc#1012985).\n- fs/dcache: move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).\n- fuse: do not use iocb after it may have been freed (bsc#1012985).\n- hpilo: Add support for iLO5 (bsc#999101).\n- ib/core: Avoid unsigned int overflow in sg_alloc_table (bsc#924381 bsc#921338).\n- ib/mlx5: Fix FW version diaplay in sysfs (bnc#923036).\n- ib/mlx5: Fix entries check in mlx5_ib_resize_cq (bnc#858727).\n- ib/mlx5: Fix entries checks in mlx5_ib_create_cq (bnc#858727).\n- ib/mlx5: Remove per-MR pas and dma pointers (bnc#923036).\n- ibmveth: calculate gso_segs for large packets (bsc#1019148).\n- ibmveth: check return of skb_linearize in ibmveth_start_xmit (bsc#1019148).\n- ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).\n- ibmveth: set correct gso_size and gso_type (bsc#1019148).\n- igb: Fix oops caused by missing queue pairing (bnc#857394).\n- ipmi_si: create hardware-independent softdep for ipmi_devintf (bsc#1009062).\n- ipr: Enable SIS pipe commands for SIS-32 devices (bsc#1016961).\n- ipv4: Fix ip_queue_xmit to pass sk into ip_local_out_sk (bsc#938963).\n- kabi: protect __sk_mem_reclaim (kabi).\n- kabi: protect struct perf_event_context (kabi).\n- kabi: reintroduce sk_filter (kabi).\n- kernel: remove broken memory detection sanity check (bnc#1008567, LTC#148072).\n- kgr: ignore zombie tasks during the patching (bnc#1008979).\n- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612).\n- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410).\n- net/mlx5: Avoid passing dma address 0 to firmware (bnc#858727).\n- net/mlx5: Fix typo in mlx5_query_port_pvlc (bnc#923036).\n- net/mlx5e: Do not modify CQ before it was created (bnc#923036).\n- net/mlx5e: Do not try to modify CQ moderation if it is not supported (bnc#923036).\n- net/mlx5e: Fix MLX5E_100BASE_T define (bnc#923036).\n- net/mlx5e: Remove wrong poll CQ optimization (bnc#923036).\n- netback: correct array index (bsc#983348).\n- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).\n- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).\n- nfsv4: Fix \u0027NFS Lock reclaim failed\u0027 errors (bsc#1014410).\n- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).\n- posix_acl: Fixup acl reference leak and missing conversions in ext3, gfs2, jfs, hfsplus.\n- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).\n- proc: avoid including \u0027mountproto=\u0027 with no protocol in /proc/mounts (bsc#1019260).\n- raid1: ignore discard error (bsc#1017164).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)\n- rpm/kernel-spec-macros: Fix the check if there is no rebuild counter (bsc#1012060)\n- rpm/kernel-spec-macros: Ignore too high rebuild counter (bsc#1012060)\n- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013001).\n- sfc: clear napi_hash state when copying channels (bsc#923037).\n- sfc: fix potential stack corruption from running past stat bitmask (bsc#923037).\n- sfc: on MC reset, clear PIO buffer linkage in TXQs (bnc#856380).\n- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).\n- sunrpc: Fix reconnection timeouts (bsc#1014410).\n- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).\n- target: Make EXTENDED_COPY 0xe4 failure return COPY TARGET DEVICE NOT REACHABLE (bsc#991273).\n- target: add XCOPY target/segment desc sense codes (bsc#991273).\n- target: bounds check XCOPY segment descriptor list (bsc#991273).\n- target: bounds check XCOPY total descriptor list length (bsc#991273).\n- target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).\n- target: check for XCOPY parameter truncation (bsc#991273).\n- target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense (bsc#991273).\n- target: simplify XCOPY wwn-\u003ese_dev lookup helper (bsc#991273).\n- target: support XCOPY requests without parameters (bsc#991273).\n- target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).\n- target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).\n- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#921778).\n- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).\n- x86/apic: Order irq_enter/exit() calls correctly vs. ack_APIC_irq() (bsc#1013479).\n- xen/ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).\n- xenbus: correctly signal errors from xenstored_local_init() (luckily none so far).\n- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).\n- xfs: refactor xlog_recover_process_data() (bsc#1019300).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-RT-12-SP1-2017-202", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0407-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0407-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170407-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0407-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" }, { "category": "self", "summary": "SUSE Bug 1003813", "url": "https://bugzilla.suse.com/1003813" }, { "category": "self", "summary": "SUSE Bug 1005666", "url": "https://bugzilla.suse.com/1005666" }, { "category": "self", "summary": "SUSE Bug 1007197", "url": "https://bugzilla.suse.com/1007197" }, { "category": "self", "summary": "SUSE Bug 1008557", "url": "https://bugzilla.suse.com/1008557" }, { "category": "self", "summary": "SUSE Bug 1008567", "url": "https://bugzilla.suse.com/1008567" }, { "category": "self", "summary": "SUSE Bug 1008831", "url": "https://bugzilla.suse.com/1008831" }, { "category": "self", "summary": "SUSE Bug 1008833", "url": "https://bugzilla.suse.com/1008833" }, { "category": "self", "summary": "SUSE Bug 1008876", "url": "https://bugzilla.suse.com/1008876" }, { "category": "self", "summary": "SUSE Bug 1008979", "url": "https://bugzilla.suse.com/1008979" }, { "category": "self", "summary": "SUSE Bug 1009062", "url": "https://bugzilla.suse.com/1009062" }, { "category": "self", "summary": "SUSE Bug 1009969", "url": "https://bugzilla.suse.com/1009969" }, { "category": "self", "summary": "SUSE Bug 1010040", "url": "https://bugzilla.suse.com/1010040" }, { "category": "self", "summary": "SUSE Bug 1010213", "url": "https://bugzilla.suse.com/1010213" }, { "category": "self", "summary": "SUSE Bug 1010294", "url": "https://bugzilla.suse.com/1010294" }, { "category": "self", "summary": "SUSE Bug 1010475", "url": "https://bugzilla.suse.com/1010475" }, { "category": "self", "summary": "SUSE Bug 1010478", "url": "https://bugzilla.suse.com/1010478" }, { "category": "self", "summary": "SUSE Bug 1010501", "url": "https://bugzilla.suse.com/1010501" }, { "category": "self", "summary": "SUSE Bug 1010502", "url": "https://bugzilla.suse.com/1010502" }, { "category": "self", "summary": "SUSE Bug 1010507", "url": "https://bugzilla.suse.com/1010507" }, { "category": "self", "summary": "SUSE Bug 1010612", "url": "https://bugzilla.suse.com/1010612" }, { "category": "self", "summary": "SUSE Bug 1010711", "url": "https://bugzilla.suse.com/1010711" }, { "category": "self", "summary": "SUSE Bug 1010716", "url": "https://bugzilla.suse.com/1010716" }, { "category": "self", "summary": "SUSE Bug 1011685", "url": "https://bugzilla.suse.com/1011685" }, { "category": "self", "summary": "SUSE Bug 1012060", "url": "https://bugzilla.suse.com/1012060" }, { "category": "self", "summary": "SUSE Bug 1012422", "url": "https://bugzilla.suse.com/1012422" }, { "category": "self", "summary": "SUSE Bug 1012754", "url": "https://bugzilla.suse.com/1012754" }, { "category": "self", "summary": "SUSE Bug 1012917", "url": "https://bugzilla.suse.com/1012917" }, { "category": "self", "summary": "SUSE Bug 1012985", "url": "https://bugzilla.suse.com/1012985" }, { "category": "self", "summary": "SUSE Bug 1013001", "url": "https://bugzilla.suse.com/1013001" }, { "category": "self", "summary": "SUSE Bug 1013038", "url": "https://bugzilla.suse.com/1013038" }, { "category": "self", "summary": "SUSE Bug 1013479", "url": "https://bugzilla.suse.com/1013479" }, { "category": "self", "summary": "SUSE Bug 1013531", "url": "https://bugzilla.suse.com/1013531" }, { "category": "self", "summary": "SUSE Bug 1013533", "url": "https://bugzilla.suse.com/1013533" }, { "category": "self", "summary": "SUSE Bug 1013540", "url": "https://bugzilla.suse.com/1013540" }, { "category": "self", "summary": "SUSE Bug 1013604", "url": "https://bugzilla.suse.com/1013604" }, { "category": "self", "summary": "SUSE Bug 1014410", "url": "https://bugzilla.suse.com/1014410" }, { "category": "self", "summary": "SUSE Bug 1014746", "url": "https://bugzilla.suse.com/1014746" }, { "category": "self", "summary": "SUSE Bug 1016713", "url": "https://bugzilla.suse.com/1016713" }, { "category": "self", "summary": "SUSE Bug 1016725", "url": "https://bugzilla.suse.com/1016725" }, { "category": "self", "summary": "SUSE Bug 1016961", "url": "https://bugzilla.suse.com/1016961" }, { "category": "self", "summary": "SUSE Bug 1017164", "url": "https://bugzilla.suse.com/1017164" }, { "category": "self", "summary": "SUSE Bug 1017170", "url": "https://bugzilla.suse.com/1017170" }, { "category": "self", "summary": "SUSE Bug 1017410", "url": "https://bugzilla.suse.com/1017410" }, { "category": "self", "summary": "SUSE Bug 1017710", "url": "https://bugzilla.suse.com/1017710" }, { "category": "self", "summary": "SUSE Bug 1018100", "url": "https://bugzilla.suse.com/1018100" }, { "category": "self", "summary": "SUSE Bug 1019032", "url": "https://bugzilla.suse.com/1019032" }, { "category": "self", "summary": "SUSE Bug 1019148", "url": "https://bugzilla.suse.com/1019148" }, { "category": "self", "summary": "SUSE Bug 1019260", "url": "https://bugzilla.suse.com/1019260" }, { "category": "self", "summary": "SUSE Bug 1019300", "url": "https://bugzilla.suse.com/1019300" }, { "category": "self", "summary": "SUSE Bug 1019783", "url": "https://bugzilla.suse.com/1019783" }, { "category": "self", "summary": "SUSE Bug 1019851", "url": "https://bugzilla.suse.com/1019851" }, { "category": "self", "summary": "SUSE Bug 1020214", "url": "https://bugzilla.suse.com/1020214" }, { "category": "self", "summary": "SUSE Bug 1020602", "url": "https://bugzilla.suse.com/1020602" }, { "category": "self", "summary": "SUSE Bug 1021258", "url": "https://bugzilla.suse.com/1021258" }, { "category": "self", "summary": "SUSE Bug 856380", "url": "https://bugzilla.suse.com/856380" }, { "category": "self", "summary": "SUSE Bug 857394", "url": "https://bugzilla.suse.com/857394" }, { "category": "self", "summary": "SUSE Bug 858727", "url": "https://bugzilla.suse.com/858727" }, { "category": "self", "summary": "SUSE Bug 921338", "url": "https://bugzilla.suse.com/921338" }, { "category": "self", "summary": "SUSE Bug 921778", "url": "https://bugzilla.suse.com/921778" }, { "category": "self", "summary": "SUSE Bug 922052", "url": "https://bugzilla.suse.com/922052" }, { "category": "self", "summary": "SUSE Bug 922056", "url": "https://bugzilla.suse.com/922056" }, { "category": "self", "summary": "SUSE Bug 923036", "url": "https://bugzilla.suse.com/923036" }, { "category": "self", "summary": "SUSE Bug 923037", "url": "https://bugzilla.suse.com/923037" }, { "category": "self", "summary": "SUSE Bug 924381", "url": "https://bugzilla.suse.com/924381" }, { "category": "self", "summary": "SUSE Bug 938963", "url": "https://bugzilla.suse.com/938963" }, { "category": "self", "summary": "SUSE Bug 972993", "url": "https://bugzilla.suse.com/972993" }, { "category": "self", "summary": "SUSE Bug 980560", "url": "https://bugzilla.suse.com/980560" }, { "category": "self", "summary": "SUSE Bug 981709", "url": "https://bugzilla.suse.com/981709" }, { "category": "self", "summary": "SUSE Bug 983087", "url": "https://bugzilla.suse.com/983087" }, { "category": "self", "summary": "SUSE Bug 983348", "url": "https://bugzilla.suse.com/983348" }, { "category": "self", "summary": "SUSE Bug 984194", "url": "https://bugzilla.suse.com/984194" }, { "category": "self", "summary": "SUSE Bug 984419", "url": "https://bugzilla.suse.com/984419" }, { "category": "self", "summary": "SUSE Bug 985850", "url": "https://bugzilla.suse.com/985850" }, { "category": "self", "summary": "SUSE Bug 987192", "url": "https://bugzilla.suse.com/987192" }, { "category": "self", "summary": "SUSE Bug 987576", "url": "https://bugzilla.suse.com/987576" }, { "category": "self", "summary": "SUSE Bug 990384", "url": "https://bugzilla.suse.com/990384" }, { "category": "self", "summary": "SUSE Bug 991273", "url": "https://bugzilla.suse.com/991273" }, { "category": "self", "summary": "SUSE Bug 993739", "url": "https://bugzilla.suse.com/993739" }, { "category": "self", "summary": "SUSE Bug 997807", "url": "https://bugzilla.suse.com/997807" }, { "category": "self", "summary": "SUSE Bug 999101", "url": "https://bugzilla.suse.com/999101" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8962 page", "url": "https://www.suse.com/security/cve/CVE-2015-8962/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8963 page", "url": "https://www.suse.com/security/cve/CVE-2015-8963/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8964 page", "url": "https://www.suse.com/security/cve/CVE-2015-8964/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10088 page", "url": "https://www.suse.com/security/cve/CVE-2016-10088/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7910 page", "url": "https://www.suse.com/security/cve/CVE-2016-7910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7911 page", "url": "https://www.suse.com/security/cve/CVE-2016-7911/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7913 page", "url": "https://www.suse.com/security/cve/CVE-2016-7913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7914 page", "url": "https://www.suse.com/security/cve/CVE-2016-7914/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8399 page", "url": "https://www.suse.com/security/cve/CVE-2016-8399/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8632 page", "url": "https://www.suse.com/security/cve/CVE-2016-8632/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8633 page", "url": "https://www.suse.com/security/cve/CVE-2016-8633/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8645 page", "url": "https://www.suse.com/security/cve/CVE-2016-8645/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8655 page", "url": "https://www.suse.com/security/cve/CVE-2016-8655/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9083 page", "url": "https://www.suse.com/security/cve/CVE-2016-9083/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9084 page", "url": "https://www.suse.com/security/cve/CVE-2016-9084/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9576 page", "url": "https://www.suse.com/security/cve/CVE-2016-9576/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9756 page", "url": "https://www.suse.com/security/cve/CVE-2016-9756/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9793 page", "url": "https://www.suse.com/security/cve/CVE-2016-9793/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9794 page", "url": "https://www.suse.com/security/cve/CVE-2016-9794/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9806 page", "url": "https://www.suse.com/security/cve/CVE-2016-9806/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2583 page", "url": "https://www.suse.com/security/cve/CVE-2017-2583/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2584 page", "url": "https://www.suse.com/security/cve/CVE-2017-2584/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5551 page", "url": "https://www.suse.com/security/cve/CVE-2017-5551/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-02-06T14:41:53Z", "generator": { "date": "2017-02-06T14:41:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0407-1", "initial_release_date": "2017-02-06T14:41:53Z", "revision_history": [ { "date": "2017-02-06T14:41:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-3.12.69-60.30.1.noarch", "product": { "name": "kernel-devel-rt-3.12.69-60.30.1.noarch", "product_id": "kernel-devel-rt-3.12.69-60.30.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-3.12.69-60.30.1.noarch", "product": { "name": "kernel-source-rt-3.12.69-60.30.1.noarch", "product_id": "kernel-source-rt-3.12.69-60.30.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-compute-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-compute-3.12.69-60.30.1.x86_64", "product_id": "kernel-compute-3.12.69-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute-base-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-compute-base-3.12.69-60.30.1.x86_64", "product_id": "kernel-compute-base-3.12.69-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute-devel-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-compute-devel-3.12.69-60.30.1.x86_64", "product_id": "kernel-compute-devel-3.12.69-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "product_id": "kernel-compute_debug-devel-3.12.69-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-rt-3.12.69-60.30.1.x86_64", "product_id": "kernel-rt-3.12.69-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-rt-base-3.12.69-60.30.1.x86_64", "product_id": "kernel-rt-base-3.12.69-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-rt-devel-3.12.69-60.30.1.x86_64", "product_id": "kernel-rt-devel-3.12.69-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "product_id": "kernel-rt_debug-devel-3.12.69-60.30.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.12.69-60.30.1.x86_64", "product": { "name": "kernel-syms-rt-3.12.69-60.30.1.x86_64", "product_id": "kernel-syms-rt-3.12.69-60.30.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP1", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-compute-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-base-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-compute-base-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-devel-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-compute-devel-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute_debug-devel-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-3.12.69-60.30.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch" }, "product_reference": "kernel-devel-rt-3.12.69-60.30.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-rt-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-rt-base-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-rt-devel-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.12.69-60.30.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch" }, "product_reference": "kernel-source-rt-3.12.69-60.30.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.12.69-60.30.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" }, "product_reference": "kernel-syms-rt-3.12.69-60.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-8962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8962" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8962", "url": "https://www.suse.com/security/cve/CVE-2015-8962" }, { "category": "external", "summary": "SUSE Bug 1010501 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1010501" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2015-8962" }, { "cve": "CVE-2015-8963", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8963" } ], "notes": [ { "category": "general", "text": "Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8963", "url": "https://www.suse.com/security/cve/CVE-2015-8963" }, { "category": "external", "summary": "SUSE Bug 1010502 for CVE-2015-8963", "url": "https://bugzilla.suse.com/1010502" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2015-8963" }, { "cve": "CVE-2015-8964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8964" } ], "notes": [ { "category": "general", "text": "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8964", "url": "https://www.suse.com/security/cve/CVE-2015-8964" }, { "category": "external", "summary": "SUSE Bug 1010507 for CVE-2015-8964", "url": "https://bugzilla.suse.com/1010507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "low" } ], "title": "CVE-2015-8964" }, { "cve": "CVE-2016-10088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10088" } ], "notes": [ { "category": "general", "text": "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10088", "url": "https://www.suse.com/security/cve/CVE-2016-10088" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2016-10088" }, { "cve": "CVE-2016-7910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7910" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7910", "url": "https://www.suse.com/security/cve/CVE-2016-7910" }, { "category": "external", "summary": "SUSE Bug 1010716 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1010716" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1196722 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1196722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2016-7910" }, { "cve": "CVE-2016-7911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7911" } ], "notes": [ { "category": "general", "text": "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7911", "url": "https://www.suse.com/security/cve/CVE-2016-7911" }, { "category": "external", "summary": "SUSE Bug 1010711 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010711" }, { "category": "external", "summary": "SUSE Bug 1010713 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010713" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-7911" }, { "cve": "CVE-2016-7913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7913" } ], "notes": [ { "category": "general", "text": "The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7913", "url": "https://www.suse.com/security/cve/CVE-2016-7913" }, { "category": "external", "summary": "SUSE Bug 1010478 for CVE-2016-7913", "url": "https://bugzilla.suse.com/1010478" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2016-7913" }, { "cve": "CVE-2016-7914", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7914" } ], "notes": [ { "category": "general", "text": "The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7914", "url": "https://www.suse.com/security/cve/CVE-2016-7914" }, { "category": "external", "summary": "SUSE Bug 1010475 for CVE-2016-7914", "url": "https://bugzilla.suse.com/1010475" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-7914" }, { "cve": "CVE-2016-8399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8399" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8399", "url": "https://www.suse.com/security/cve/CVE-2016-8399" }, { "category": "external", "summary": "SUSE Bug 1014746 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1014746" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-8399" }, { "cve": "CVE-2016-8632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8632" } ], "notes": [ { "category": "general", "text": "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8632", "url": "https://www.suse.com/security/cve/CVE-2016-8632" }, { "category": "external", "summary": "SUSE Bug 1008831 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1008831" }, { "category": "external", "summary": "SUSE Bug 1012852 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1012852" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-8632" }, { "cve": "CVE-2016-8633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8633" } ], "notes": [ { "category": "general", "text": "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8633", "url": "https://www.suse.com/security/cve/CVE-2016-8633" }, { "category": "external", "summary": "SUSE Bug 1008833 for CVE-2016-8633", "url": "https://bugzilla.suse.com/1008833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-8633" }, { "cve": "CVE-2016-8645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8645" } ], "notes": [ { "category": "general", "text": "The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8645", "url": "https://www.suse.com/security/cve/CVE-2016-8645" }, { "category": "external", "summary": "SUSE Bug 1009969 for CVE-2016-8645", "url": "https://bugzilla.suse.com/1009969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-8645" }, { "cve": "CVE-2016-8655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8655" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8655", "url": "https://www.suse.com/security/cve/CVE-2016-8655" }, { "category": "external", "summary": "SUSE Bug 1012754 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012754" }, { "category": "external", "summary": "SUSE Bug 1012759 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1012759" }, { "category": "external", "summary": "SUSE Bug 1013822 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1013822" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2016-8655", "url": "https://bugzilla.suse.com/1052365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-8655" }, { "cve": "CVE-2016-9083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9083" } ], "notes": [ { "category": "general", "text": "drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a \"state machine confusion bug.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9083", "url": "https://www.suse.com/security/cve/CVE-2016-9083" }, { "category": "external", "summary": "SUSE Bug 1007197 for CVE-2016-9083", "url": "https://bugzilla.suse.com/1007197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "low" } ], "title": "CVE-2016-9083" }, { "cve": "CVE-2016-9084", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9084" } ], "notes": [ { "category": "general", "text": "drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11 misuses the kzalloc function, which allows local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9084", "url": "https://www.suse.com/security/cve/CVE-2016-9084" }, { "category": "external", "summary": "SUSE Bug 1007197 for CVE-2016-9084", "url": "https://bugzilla.suse.com/1007197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "low" } ], "title": "CVE-2016-9084" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2016-9555" }, { "cve": "CVE-2016-9576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9576" } ], "notes": [ { "category": "general", "text": "The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9576", "url": "https://www.suse.com/security/cve/CVE-2016-9576" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1019668 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1019668" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2016-9576" }, { "cve": "CVE-2016-9756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9756" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9756", "url": "https://www.suse.com/security/cve/CVE-2016-9756" }, { "category": "external", "summary": "SUSE Bug 1013038 for CVE-2016-9756", "url": "https://bugzilla.suse.com/1013038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-9756" }, { "cve": "CVE-2016-9793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9793" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9793", "url": "https://www.suse.com/security/cve/CVE-2016-9793" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2016-9793" }, { "cve": "CVE-2016-9794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9794" } ], "notes": [ { "category": "general", "text": "Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9794", "url": "https://www.suse.com/security/cve/CVE-2016-9794" }, { "category": "external", "summary": "SUSE Bug 1013533 for CVE-2016-9794", "url": "https://bugzilla.suse.com/1013533" }, { "category": "external", "summary": "SUSE Bug 1013543 for CVE-2016-9794", "url": "https://bugzilla.suse.com/1013543" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-9794", "url": "https://bugzilla.suse.com/1013604" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2016-9794" }, { "cve": "CVE-2016-9806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9806" } ], "notes": [ { "category": "general", "text": "Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before 4.6.3 allows local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that makes sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9806", "url": "https://www.suse.com/security/cve/CVE-2016-9806" }, { "category": "external", "summary": "SUSE Bug 1013540 for CVE-2016-9806", "url": "https://bugzilla.suse.com/1013540" }, { "category": "external", "summary": "SUSE Bug 1017589 for CVE-2016-9806", "url": "https://bugzilla.suse.com/1017589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "important" } ], "title": "CVE-2016-9806" }, { "cve": "CVE-2017-2583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2583" } ], "notes": [ { "category": "general", "text": "The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a \"MOV SS, NULL selector\" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2583", "url": "https://www.suse.com/security/cve/CVE-2017-2583" }, { "category": "external", "summary": "SUSE Bug 1020602 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1020602" }, { "category": "external", "summary": "SUSE Bug 1030573 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1030573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2017-2583" }, { "cve": "CVE-2017-2584", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2584" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2584", "url": "https://www.suse.com/security/cve/CVE-2017-2584" }, { "category": "external", "summary": "SUSE Bug 1019851 for CVE-2017-2584", "url": "https://bugzilla.suse.com/1019851" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2584", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2017-2584" }, { "cve": "CVE-2017-5551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5551" } ], "notes": [ { "category": "general", "text": "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5551", "url": "https://www.suse.com/security/cve/CVE-2017-5551" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2017-5551", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2017-5551", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.69-60.30.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.69-60.30.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.69-60.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-06T14:41:53Z", "details": "moderate" } ], "title": "CVE-2017-5551" } ] }
suse-su-2017:0464-1
Vulnerability from csaf_suse
Published
2017-02-14 19:07
Modified
2017-02-14 19:07
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.69 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation (bnc#1010502).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
- CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478).
- CVE-2016-7914: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite (bnc#1010475).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935 (bnc#1014746).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel, in certain unusual hardware configurations, allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).
- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a 'state machine confusion bug' (bnc#1007197).
- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel misuses the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531 1013542).
- CVE-2016-9806: Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that made sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated (bnc#1013540 1017589).
- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt (bsc#1019851).
- CVE-2017-2583: Fixed broken emulation of 'MOV SS, null selector' (bsc#1020602).
- CVE-2017-5551: Clear SGID bit when setting file permissions on tmpfs (bsc#1021258).
The following non-security bugs were fixed:
- Fixup acl reference leak and missing conversions in ext3, gfs2, jfs, hfsplus
- RAID1: ignore discard error (bsc#1017164).
- Update patches.suse/btrfs-8446-fix-qgroup-accounting-when-creating-snap.patch (bsc#972993).
- blacklist: PCI fixes required only for cxl (bsc#1016713).
- blacklist: cxl fixes on SLE12 SP1 (bsc#1016725)
- blacklist: ibmvnic fixes on SLE12 SP1 (bsc#1016961)
- block_dev: do not test bdev->bd_contains when it is not stable (bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- bnx2i/bnx2fc : fix randconfig error in next-20140909 (bsc#922052 fate#318602 bsc#922056 FATE#318604).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- bnx2x: fix lockdep splat (bsc#922052 fate#318602 bsc#922056 FATE#318604).
- btrfs: Ensure proper sector alignment for btrfs_free_reserved_data_space (bsc#1005666).
- btrfs: Export and move leaf/subtree qgroup helpers to qgroup.c (bsc#983087).
- btrfs: Revert 'Btrfs: do not delay inode ref updates during log replay' (bsc#987192).
- btrfs: bugfix: handle FS_IOC32_{GETFLAGS,SETFLAGS,GETVERSION} in btrfs_ioctl (bsc#1018100).
- btrfs: do not delay inode ref updates during log replay (bsc#987192).
- btrfs: fix incremental send failure caused by balance (bsc#985850).
- btrfs: fix relocation incorrectly dropping data references (bsc#990384).
- btrfs: increment ctx->pos for every emitted or skipped dirent in readdir (bsc#981709).
- btrfs: qgroup: Fix qgroup data leaking by using subtree tracing (bsc#983087).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).
- btrfs: send, do not bug on inconsistent snapshots (bsc#985850).
- cpufreq: intel_pstate: Fix divide by zero on Knights Landing (KNL) (bsc#1008876).
- ext4: fix data exposure after a crash (bsc#1012985).
- fs: avoid including 'mountproto=' with no protocol in /proc/mounts (bsc#1019260).
- fuse: do not use iocb after it may have been freed (bsc#1012985).
- hpilo: Add support for iLO5 (bsc#999101).
- ib/core: Avoid unsigned int overflow in sg_alloc_table (bsc#924381 FATE#318568 bsc#921338).
- ib/mlx5: Fix FW version diaplay in sysfs (bnc#923036 FATE#318772).
- ib/mlx5: Fix entries check in mlx5_ib_resize_cq (bnc#858727 FATE#315946).
- ib/mlx5: Fix entries checks in mlx5_ib_create_cq (bnc#858727 FATE#315946).
- ib/mlx5: Remove per-MR pas and dma pointers (bnc#923036 FATE#318772).
- ibmveth: calculate gso_segs for large packets (bsc#1019148).
- ibmveth: check return of skb_linearize in ibmveth_start_xmit (bsc#1019148).
- ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).
- ibmveth: set correct gso_size and gso_type (bsc#1019148).
- igb: Fix oops caused by missing queue pairing (bnc#857394).
- ipmi_si: create hardware-independent softdep for ipmi_devintf (bsc#1009062).
- ipr: Enable SIS pipe commands for SIS-32 devices (bsc#1016961).
- ipv4: Fix ip_queue_xmit to pass sk into ip_local_out_sk (bsc#938963 FATE#319084).
- kabi fix (bsc#1014410).
- kabi: Whitelist KVM KABI changes resulting from adding a hcall. caused by 5246adec59458b5d325b8e1462ea9ef3ead7f6ae powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec No problem is expected as result of changing KVM KABI so whitelisting for now. If we get some additional input from IBM we can back out the patch.
- kabi: protect __sk_mem_reclaim (kabi).
- kabi: protect struct perf_event_context (kabi).
- kabi: reintroduce sk_filter (kabi).
- kbuild: Fix removal of the debian/ directory (bsc#1010213).
- kernel: remove broken memory detection sanity check (bnc#1008567, LTC#148072).
- kgr: ignore zombie tasks during the patching (bnc#1008979).
- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612).
- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410).
- move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).
- net/mlx5: Avoid passing dma address 0 to firmware (bnc#858727 FATE#315946).
- net/mlx5: Fix typo in mlx5_query_port_pvlc (bnc#923036 FATE#318772).
- net/mlx5e: Do not modify CQ before it was created (bnc#923036 FATE#318772).
- net/mlx5e: Do not try to modify CQ moderation if it is not supported (bnc#923036 FATE#318772).
- net/mlx5e: Fix MLX5E_100BASE_T define (bnc#923036 FATE#318772).
- net/mlx5e: Remove wrong poll CQ optimization (bnc#923036 FATE#318772).
- netback: correct array index (bsc#983348).
- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm/kernel-spec-macros: Fix the check if there is no rebuild counter (bsc#1012060)
- rpm/kernel-spec-macros: Ignore too high rebuild counter (bsc#1012060)
- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013001).
- serial: 8250_pci: Fix potential use-after-free in error path (bsc#1013001).
- sfc: clear napi_hash state when copying channels (bsc#923037 FATE#318563).
- sfc: fix potential stack corruption from running past stat bitmask (bsc#923037 FATE#318563).
- sfc: on MC reset, clear PIO buffer linkage in TXQs (bnc#856380 FATE#315942).
- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
- supported.conf: Add lib/*.ko to supported.conf (bsc#1019032)
- target: Make EXTENDED_COPY 0xe4 failure return COPY TARGET DEVICE NOT REACHABLE (bsc#991273).
- target: add XCOPY target/segment desc sense codes (bsc#991273).
- target: bounds check XCOPY segment descriptor list (bsc#991273).
- target: bounds check XCOPY total descriptor list length (bsc#991273).
- target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).
- target: check for XCOPY parameter truncation (bsc#991273).
- target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense (bsc#991273).
- target: simplify XCOPY wwn->se_dev lookup helper (bsc#991273).
- target: support XCOPY requests without parameters (bsc#991273).
- target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).
- target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#921778 FATE#318558).
- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).
- x86/apic: Order irq_enter/exit() calls correctly vs. ack_APIC_irq() (bsc#1013479).
- xen/ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- xenbus: correctly signal errors from xenstored_local_init() (luckily none so far).
- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).
- xfs: refactor xlog_recover_process_data() (bsc#1019300).
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2017-238,SUSE-SLE-Live-Patching-12-2017-238,SUSE-SLE-Module-Public-Cloud-12-2017-238,SUSE-SLE-SDK-12-SP1-2017-238,SUSE-SLE-SERVER-12-SP1-2017-238,SUSE-SLE-WE-12-SP1-2017-238
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.69 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation (bnc#1010502).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).\n- CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478).\n- CVE-2016-7914: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite (bnc#1010475).\n- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935 (bnc#1014746).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel, in certain unusual hardware configurations, allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).\n- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).\n- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a \u0027state machine confusion bug\u0027 (bnc#1007197).\n- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel misuses the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531 1013542).\n- CVE-2016-9806: Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that made sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated (bnc#1013540 1017589).\n- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt (bsc#1019851).\n- CVE-2017-2583: Fixed broken emulation of \u0027MOV SS, null selector\u0027 (bsc#1020602).\n- CVE-2017-5551: Clear SGID bit when setting file permissions on tmpfs (bsc#1021258).\n\n\nThe following non-security bugs were fixed:\n\n- Fixup acl reference leak and missing conversions in ext3, gfs2, jfs, hfsplus \n- RAID1: ignore discard error (bsc#1017164).\n- Update patches.suse/btrfs-8446-fix-qgroup-accounting-when-creating-snap.patch (bsc#972993).\n- blacklist: PCI fixes required only for cxl (bsc#1016713).\n- blacklist: cxl fixes on SLE12 SP1 (bsc#1016725)\n- blacklist: ibmvnic fixes on SLE12 SP1 (bsc#1016961)\n- block_dev: do not test bdev-\u003ebd_contains when it is not stable (bsc#1008557).\n- bna: Add synchronization for tx ring (bsc#993739).\n- bnx2i/bnx2fc : fix randconfig error in next-20140909 (bsc#922052 fate#318602 bsc#922056 FATE#318604).\n- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).\n- bnx2x: fix lockdep splat (bsc#922052 fate#318602 bsc#922056 FATE#318604).\n- btrfs: Ensure proper sector alignment for btrfs_free_reserved_data_space (bsc#1005666).\n- btrfs: Export and move leaf/subtree qgroup helpers to qgroup.c (bsc#983087).\n- btrfs: Revert \u0027Btrfs: do not delay inode ref updates during log replay\u0027 (bsc#987192).\n- btrfs: bugfix: handle FS_IOC32_{GETFLAGS,SETFLAGS,GETVERSION} in btrfs_ioctl (bsc#1018100).\n- btrfs: do not delay inode ref updates during log replay (bsc#987192).\n- btrfs: fix incremental send failure caused by balance (bsc#985850).\n- btrfs: fix relocation incorrectly dropping data references (bsc#990384).\n- btrfs: increment ctx-\u003epos for every emitted or skipped dirent in readdir (bsc#981709).\n- btrfs: qgroup: Fix qgroup data leaking by using subtree tracing (bsc#983087).\n- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).\n- btrfs: send, do not bug on inconsistent snapshots (bsc#985850).\n- cpufreq: intel_pstate: Fix divide by zero on Knights Landing (KNL) (bsc#1008876).\n- ext4: fix data exposure after a crash (bsc#1012985).\n- fs: avoid including \u0027mountproto=\u0027 with no protocol in /proc/mounts (bsc#1019260).\n- fuse: do not use iocb after it may have been freed (bsc#1012985).\n- hpilo: Add support for iLO5 (bsc#999101).\n- ib/core: Avoid unsigned int overflow in sg_alloc_table (bsc#924381 FATE#318568 bsc#921338).\n- ib/mlx5: Fix FW version diaplay in sysfs (bnc#923036 FATE#318772).\n- ib/mlx5: Fix entries check in mlx5_ib_resize_cq (bnc#858727 FATE#315946).\n- ib/mlx5: Fix entries checks in mlx5_ib_create_cq (bnc#858727 FATE#315946).\n- ib/mlx5: Remove per-MR pas and dma pointers (bnc#923036 FATE#318772).\n- ibmveth: calculate gso_segs for large packets (bsc#1019148).\n- ibmveth: check return of skb_linearize in ibmveth_start_xmit (bsc#1019148).\n- ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).\n- ibmveth: set correct gso_size and gso_type (bsc#1019148).\n- igb: Fix oops caused by missing queue pairing (bnc#857394).\n- ipmi_si: create hardware-independent softdep for ipmi_devintf (bsc#1009062).\n- ipr: Enable SIS pipe commands for SIS-32 devices (bsc#1016961).\n- ipv4: Fix ip_queue_xmit to pass sk into ip_local_out_sk (bsc#938963 FATE#319084).\n- kabi fix (bsc#1014410).\n- kabi: Whitelist KVM KABI changes resulting from adding a hcall. caused by 5246adec59458b5d325b8e1462ea9ef3ead7f6ae powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec No problem is expected as result of changing KVM KABI so whitelisting for now. If we get some additional input from IBM we can back out the patch.\n- kabi: protect __sk_mem_reclaim (kabi).\n- kabi: protect struct perf_event_context (kabi).\n- kabi: reintroduce sk_filter (kabi).\n- kbuild: Fix removal of the debian/ directory (bsc#1010213).\n- kernel: remove broken memory detection sanity check (bnc#1008567, LTC#148072).\n- kgr: ignore zombie tasks during the patching (bnc#1008979).\n- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612).\n- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410).\n- move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).\n- net/mlx5: Avoid passing dma address 0 to firmware (bnc#858727 FATE#315946).\n- net/mlx5: Fix typo in mlx5_query_port_pvlc (bnc#923036 FATE#318772).\n- net/mlx5e: Do not modify CQ before it was created (bnc#923036 FATE#318772).\n- net/mlx5e: Do not try to modify CQ moderation if it is not supported (bnc#923036 FATE#318772).\n- net/mlx5e: Fix MLX5E_100BASE_T define (bnc#923036 FATE#318772).\n- net/mlx5e: Remove wrong poll CQ optimization (bnc#923036 FATE#318772).\n- netback: correct array index (bsc#983348).\n- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).\n- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).\n- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).\n- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)\n- rpm/kernel-spec-macros: Fix the check if there is no rebuild counter (bsc#1012060)\n- rpm/kernel-spec-macros: Ignore too high rebuild counter (bsc#1012060)\n- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013001).\n- serial: 8250_pci: Fix potential use-after-free in error path (bsc#1013001).\n- sfc: clear napi_hash state when copying channels (bsc#923037 FATE#318563).\n- sfc: fix potential stack corruption from running past stat bitmask (bsc#923037 FATE#318563).\n- sfc: on MC reset, clear PIO buffer linkage in TXQs (bnc#856380 FATE#315942).\n- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).\n- sunrpc: Fix reconnection timeouts (bsc#1014410).\n- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).\n- supported.conf: Add lib/*.ko to supported.conf (bsc#1019032)\n- target: Make EXTENDED_COPY 0xe4 failure return COPY TARGET DEVICE NOT REACHABLE (bsc#991273).\n- target: add XCOPY target/segment desc sense codes (bsc#991273).\n- target: bounds check XCOPY segment descriptor list (bsc#991273).\n- target: bounds check XCOPY total descriptor list length (bsc#991273).\n- target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).\n- target: check for XCOPY parameter truncation (bsc#991273).\n- target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense (bsc#991273).\n- target: simplify XCOPY wwn-\u003ese_dev lookup helper (bsc#991273).\n- target: support XCOPY requests without parameters (bsc#991273).\n- target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).\n- target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).\n- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#921778 FATE#318558).\n- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).\n- x86/apic: Order irq_enter/exit() calls correctly vs. ack_APIC_irq() (bsc#1013479).\n- xen/ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).\n- xenbus: correctly signal errors from xenstored_local_init() (luckily none so far).\n- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).\n- xfs: refactor xlog_recover_process_data() (bsc#1019300).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2017-238,SUSE-SLE-Live-Patching-12-2017-238,SUSE-SLE-Module-Public-Cloud-12-2017-238,SUSE-SLE-SDK-12-SP1-2017-238,SUSE-SLE-SERVER-12-SP1-2017-238,SUSE-SLE-WE-12-SP1-2017-238", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0464-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0464-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170464-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0464-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" }, { "category": "self", "summary": "SUSE Bug 1003813", "url": "https://bugzilla.suse.com/1003813" }, { "category": "self", "summary": "SUSE Bug 1005666", "url": "https://bugzilla.suse.com/1005666" }, { "category": "self", "summary": "SUSE Bug 1007197", "url": "https://bugzilla.suse.com/1007197" }, { "category": "self", "summary": "SUSE Bug 1008557", "url": "https://bugzilla.suse.com/1008557" }, { "category": "self", "summary": "SUSE Bug 1008567", "url": "https://bugzilla.suse.com/1008567" }, { "category": "self", "summary": "SUSE Bug 1008833", "url": "https://bugzilla.suse.com/1008833" }, { "category": "self", "summary": "SUSE Bug 1008876", "url": "https://bugzilla.suse.com/1008876" }, { "category": "self", "summary": "SUSE Bug 1008979", "url": "https://bugzilla.suse.com/1008979" }, { "category": "self", "summary": "SUSE Bug 1009062", "url": "https://bugzilla.suse.com/1009062" }, { "category": "self", "summary": "SUSE Bug 1009969", "url": "https://bugzilla.suse.com/1009969" }, { "category": "self", "summary": "SUSE Bug 1010040", "url": "https://bugzilla.suse.com/1010040" }, { "category": "self", "summary": "SUSE Bug 1010213", "url": "https://bugzilla.suse.com/1010213" }, { "category": "self", "summary": "SUSE Bug 1010294", "url": "https://bugzilla.suse.com/1010294" }, { "category": "self", "summary": "SUSE Bug 1010475", "url": "https://bugzilla.suse.com/1010475" }, { "category": "self", "summary": "SUSE Bug 1010478", "url": "https://bugzilla.suse.com/1010478" }, { "category": "self", "summary": "SUSE Bug 1010501", "url": "https://bugzilla.suse.com/1010501" }, { "category": "self", "summary": "SUSE Bug 1010502", "url": "https://bugzilla.suse.com/1010502" }, { "category": "self", "summary": "SUSE Bug 1010507", "url": "https://bugzilla.suse.com/1010507" }, { "category": "self", "summary": "SUSE Bug 1010612", "url": "https://bugzilla.suse.com/1010612" }, { "category": "self", "summary": "SUSE Bug 1010711", "url": "https://bugzilla.suse.com/1010711" }, { "category": "self", "summary": "SUSE Bug 1010716", "url": "https://bugzilla.suse.com/1010716" }, { "category": "self", "summary": "SUSE Bug 1012060", "url": "https://bugzilla.suse.com/1012060" }, { "category": "self", "summary": "SUSE Bug 1012422", "url": "https://bugzilla.suse.com/1012422" }, { "category": "self", "summary": "SUSE Bug 1012917", "url": "https://bugzilla.suse.com/1012917" }, { "category": "self", "summary": "SUSE Bug 1012985", "url": "https://bugzilla.suse.com/1012985" }, { "category": "self", "summary": "SUSE Bug 1013001", "url": "https://bugzilla.suse.com/1013001" }, { "category": "self", "summary": "SUSE Bug 1013038", "url": "https://bugzilla.suse.com/1013038" }, { "category": "self", "summary": "SUSE Bug 1013479", "url": "https://bugzilla.suse.com/1013479" }, { "category": "self", "summary": "SUSE Bug 1013531", "url": "https://bugzilla.suse.com/1013531" }, { "category": "self", "summary": "SUSE Bug 1013540", "url": "https://bugzilla.suse.com/1013540" }, { "category": "self", "summary": "SUSE Bug 1013542", "url": "https://bugzilla.suse.com/1013542" }, { "category": "self", "summary": "SUSE Bug 1014410", "url": "https://bugzilla.suse.com/1014410" }, { "category": "self", "summary": "SUSE Bug 1014746", "url": "https://bugzilla.suse.com/1014746" }, { "category": "self", "summary": "SUSE Bug 1016713", "url": "https://bugzilla.suse.com/1016713" }, { "category": "self", "summary": "SUSE Bug 1016725", "url": "https://bugzilla.suse.com/1016725" }, { "category": "self", "summary": "SUSE Bug 1016961", "url": "https://bugzilla.suse.com/1016961" }, { "category": "self", "summary": "SUSE Bug 1017164", "url": "https://bugzilla.suse.com/1017164" }, { "category": "self", "summary": "SUSE Bug 1017170", "url": "https://bugzilla.suse.com/1017170" }, { "category": "self", "summary": "SUSE Bug 1017410", "url": "https://bugzilla.suse.com/1017410" }, { "category": "self", "summary": "SUSE Bug 1017589", "url": "https://bugzilla.suse.com/1017589" }, { "category": "self", "summary": "SUSE Bug 1017710", "url": "https://bugzilla.suse.com/1017710" }, { "category": "self", "summary": "SUSE Bug 1018100", "url": "https://bugzilla.suse.com/1018100" }, { "category": "self", "summary": "SUSE Bug 1019032", "url": "https://bugzilla.suse.com/1019032" }, { "category": "self", "summary": "SUSE Bug 1019148", "url": "https://bugzilla.suse.com/1019148" }, { "category": "self", "summary": "SUSE Bug 1019260", "url": "https://bugzilla.suse.com/1019260" }, { "category": "self", "summary": "SUSE Bug 1019300", "url": "https://bugzilla.suse.com/1019300" }, { "category": "self", "summary": "SUSE Bug 1019783", "url": "https://bugzilla.suse.com/1019783" }, { "category": "self", "summary": "SUSE Bug 1019851", "url": "https://bugzilla.suse.com/1019851" }, { "category": "self", "summary": "SUSE Bug 1020214", "url": "https://bugzilla.suse.com/1020214" }, { "category": "self", "summary": "SUSE Bug 1020602", "url": "https://bugzilla.suse.com/1020602" }, { "category": "self", "summary": "SUSE Bug 1021258", "url": "https://bugzilla.suse.com/1021258" }, { "category": "self", "summary": "SUSE Bug 856380", "url": "https://bugzilla.suse.com/856380" }, { "category": "self", "summary": "SUSE Bug 857394", "url": "https://bugzilla.suse.com/857394" }, { "category": "self", "summary": "SUSE Bug 858727", "url": "https://bugzilla.suse.com/858727" }, { "category": "self", "summary": "SUSE Bug 921338", "url": "https://bugzilla.suse.com/921338" }, { "category": "self", "summary": "SUSE Bug 921778", "url": "https://bugzilla.suse.com/921778" }, { "category": "self", "summary": "SUSE Bug 922052", "url": "https://bugzilla.suse.com/922052" }, { "category": "self", "summary": "SUSE Bug 922056", "url": "https://bugzilla.suse.com/922056" }, { "category": "self", "summary": "SUSE Bug 923036", "url": "https://bugzilla.suse.com/923036" }, { "category": "self", "summary": "SUSE Bug 923037", "url": "https://bugzilla.suse.com/923037" }, { "category": "self", "summary": "SUSE Bug 924381", "url": "https://bugzilla.suse.com/924381" }, { "category": "self", "summary": "SUSE Bug 938963", "url": "https://bugzilla.suse.com/938963" }, { "category": "self", "summary": "SUSE Bug 972993", "url": "https://bugzilla.suse.com/972993" }, { "category": "self", "summary": "SUSE Bug 980560", "url": "https://bugzilla.suse.com/980560" }, { "category": "self", "summary": "SUSE Bug 981709", "url": "https://bugzilla.suse.com/981709" }, { "category": "self", "summary": "SUSE Bug 983087", "url": "https://bugzilla.suse.com/983087" }, { "category": "self", "summary": "SUSE Bug 983348", "url": "https://bugzilla.suse.com/983348" }, { "category": "self", "summary": "SUSE Bug 984194", "url": "https://bugzilla.suse.com/984194" }, { "category": "self", "summary": "SUSE Bug 984419", "url": "https://bugzilla.suse.com/984419" }, { "category": "self", "summary": "SUSE Bug 985850", "url": "https://bugzilla.suse.com/985850" }, { "category": "self", "summary": "SUSE Bug 987192", "url": "https://bugzilla.suse.com/987192" }, { "category": "self", "summary": "SUSE Bug 987576", "url": "https://bugzilla.suse.com/987576" }, { "category": "self", "summary": "SUSE Bug 990384", "url": "https://bugzilla.suse.com/990384" }, { "category": "self", "summary": "SUSE Bug 991273", "url": "https://bugzilla.suse.com/991273" }, { "category": "self", "summary": "SUSE Bug 993739", "url": "https://bugzilla.suse.com/993739" }, { "category": "self", "summary": "SUSE Bug 997807", "url": "https://bugzilla.suse.com/997807" }, { "category": "self", "summary": "SUSE Bug 999101", "url": "https://bugzilla.suse.com/999101" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8962 page", "url": "https://www.suse.com/security/cve/CVE-2015-8962/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8963 page", "url": "https://www.suse.com/security/cve/CVE-2015-8963/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8964 page", "url": "https://www.suse.com/security/cve/CVE-2015-8964/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10088 page", "url": "https://www.suse.com/security/cve/CVE-2016-10088/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7910 page", "url": "https://www.suse.com/security/cve/CVE-2016-7910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7911 page", "url": "https://www.suse.com/security/cve/CVE-2016-7911/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7913 page", "url": "https://www.suse.com/security/cve/CVE-2016-7913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7914 page", "url": "https://www.suse.com/security/cve/CVE-2016-7914/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8399 page", "url": "https://www.suse.com/security/cve/CVE-2016-8399/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8633 page", "url": "https://www.suse.com/security/cve/CVE-2016-8633/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8645 page", "url": "https://www.suse.com/security/cve/CVE-2016-8645/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9083 page", "url": "https://www.suse.com/security/cve/CVE-2016-9083/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9084 page", "url": "https://www.suse.com/security/cve/CVE-2016-9084/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9756 page", "url": "https://www.suse.com/security/cve/CVE-2016-9756/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9793 page", "url": "https://www.suse.com/security/cve/CVE-2016-9793/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9806 page", "url": "https://www.suse.com/security/cve/CVE-2016-9806/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2583 page", "url": "https://www.suse.com/security/cve/CVE-2017-2583/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2584 page", "url": "https://www.suse.com/security/cve/CVE-2017-2584/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5551 page", "url": "https://www.suse.com/security/cve/CVE-2017-5551/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-02-14T19:07:43Z", "generator": { "date": "2017-02-14T19:07:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0464-1", "initial_release_date": "2017-02-14T19:07:43Z", "revision_history": [ { "date": "2017-02-14T19:07:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.69-60.64.29.1.noarch", "product": { "name": "kernel-devel-3.12.69-60.64.29.1.noarch", "product_id": "kernel-devel-3.12.69-60.64.29.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.69-60.64.29.1.noarch", "product": { "name": "kernel-macros-3.12.69-60.64.29.1.noarch", "product_id": "kernel-macros-3.12.69-60.64.29.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.69-60.64.29.1.noarch", "product": { "name": "kernel-source-3.12.69-60.64.29.1.noarch", "product_id": "kernel-source-3.12.69-60.64.29.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.69-60.64.29.3.noarch", "product": { "name": "kernel-docs-3.12.69-60.64.29.3.noarch", "product_id": "kernel-docs-3.12.69-60.64.29.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "product": { "name": "kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "product_id": "kernel-obs-build-3.12.69-60.64.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.69-60.64.29.1.ppc64le", "product": { "name": "kernel-default-3.12.69-60.64.29.1.ppc64le", "product_id": "kernel-default-3.12.69-60.64.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.69-60.64.29.1.ppc64le", "product": { "name": "kernel-default-base-3.12.69-60.64.29.1.ppc64le", "product_id": "kernel-default-base-3.12.69-60.64.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "product_id": "kernel-default-devel-3.12.69-60.64.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.69-60.64.29.1.ppc64le", "product": { "name": "kernel-syms-3.12.69-60.64.29.1.ppc64le", "product_id": "kernel-syms-3.12.69-60.64.29.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.69-60.64.29.1.s390x", "product": { "name": "kernel-obs-build-3.12.69-60.64.29.1.s390x", "product_id": "kernel-obs-build-3.12.69-60.64.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.69-60.64.29.1.s390x", "product": { "name": "kernel-default-3.12.69-60.64.29.1.s390x", "product_id": "kernel-default-3.12.69-60.64.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.69-60.64.29.1.s390x", "product": { "name": "kernel-default-base-3.12.69-60.64.29.1.s390x", "product_id": "kernel-default-base-3.12.69-60.64.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.69-60.64.29.1.s390x", "product": { "name": "kernel-default-devel-3.12.69-60.64.29.1.s390x", "product_id": "kernel-default-devel-3.12.69-60.64.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.69-60.64.29.1.s390x", "product": { "name": "kernel-default-man-3.12.69-60.64.29.1.s390x", "product_id": "kernel-default-man-3.12.69-60.64.29.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.69-60.64.29.1.s390x", "product": { "name": "kernel-syms-3.12.69-60.64.29.1.s390x", "product_id": "kernel-syms-3.12.69-60.64.29.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.69-60.64.29.1.x86_64", "product": { "name": "kernel-default-3.12.69-60.64.29.1.x86_64", "product_id": "kernel-default-3.12.69-60.64.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.69-60.64.29.1.x86_64", "product": { "name": "kernel-default-devel-3.12.69-60.64.29.1.x86_64", "product_id": "kernel-default-devel-3.12.69-60.64.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.69-60.64.29.1.x86_64", "product": { "name": "kernel-default-extra-3.12.69-60.64.29.1.x86_64", "product_id": "kernel-default-extra-3.12.69-60.64.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.69-60.64.29.1.x86_64", "product": { "name": "kernel-syms-3.12.69-60.64.29.1.x86_64", "product_id": "kernel-syms-3.12.69-60.64.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.69-60.64.29.1.x86_64", "product": { "name": "kernel-xen-3.12.69-60.64.29.1.x86_64", "product_id": "kernel-xen-3.12.69-60.64.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "product_id": "kernel-xen-devel-3.12.69-60.64.29.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "product": { "name": "kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "product_id": "kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "product": { "name": "kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "product_id": "kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.69-60.64.29.1.x86_64", "product": { "name": "kernel-ec2-3.12.69-60.64.29.1.x86_64", "product_id": "kernel-ec2-3.12.69-60.64.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "product_id": "kernel-ec2-devel-3.12.69-60.64.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "product_id": "kernel-ec2-extra-3.12.69-60.64.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.69-60.64.29.1.x86_64", "product": { "name": "kernel-obs-build-3.12.69-60.64.29.1.x86_64", "product_id": "kernel-obs-build-3.12.69-60.64.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.69-60.64.29.1.x86_64", "product": { "name": "kernel-default-base-3.12.69-60.64.29.1.x86_64", "product_id": "kernel-default-base-3.12.69-60.64.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.69-60.64.29.1.x86_64", "product": { "name": "kernel-xen-base-3.12.69-60.64.29.1.x86_64", "product_id": "kernel-xen-base-3.12.69-60.64.29.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-default-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.69-60.64.29.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch" }, "product_reference": "kernel-devel-3.12.69-60.64.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.69-60.64.29.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch" }, "product_reference": "kernel-macros-3.12.69-60.64.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.69-60.64.29.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch" }, "product_reference": "kernel-source-3.12.69-60.64.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-syms-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-xen-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64" }, "product_reference": "kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64" }, "product_reference": "kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-ec2-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.69-60.64.29.3.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch" }, "product_reference": "kernel-docs-3.12.69-60.64.29.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.69-60.64.29.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le" }, "product_reference": "kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.69-60.64.29.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x" }, "product_reference": "kernel-obs-build-3.12.69-60.64.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-obs-build-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.69-60.64.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le" }, "product_reference": "kernel-default-3.12.69-60.64.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.69-60.64.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x" }, "product_reference": "kernel-default-3.12.69-60.64.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-default-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.69-60.64.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.69-60.64.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.69-60.64.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x" }, "product_reference": "kernel-default-base-3.12.69-60.64.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-default-base-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.69-60.64.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.69-60.64.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x" }, "product_reference": "kernel-default-devel-3.12.69-60.64.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.69-60.64.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x" }, "product_reference": "kernel-default-man-3.12.69-60.64.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.69-60.64.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch" }, "product_reference": "kernel-devel-3.12.69-60.64.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.69-60.64.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch" }, "product_reference": "kernel-macros-3.12.69-60.64.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.69-60.64.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch" }, "product_reference": "kernel-source-3.12.69-60.64.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.69-60.64.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le" }, "product_reference": "kernel-syms-3.12.69-60.64.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.69-60.64.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x" }, "product_reference": "kernel-syms-3.12.69-60.64.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-syms-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-xen-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.69-60.64.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le" }, "product_reference": "kernel-default-3.12.69-60.64.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.69-60.64.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x" }, "product_reference": "kernel-default-3.12.69-60.64.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-default-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.69-60.64.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.69-60.64.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.69-60.64.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x" }, "product_reference": "kernel-default-base-3.12.69-60.64.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-default-base-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.69-60.64.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.69-60.64.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x" }, "product_reference": "kernel-default-devel-3.12.69-60.64.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.69-60.64.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x" }, "product_reference": "kernel-default-man-3.12.69-60.64.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.69-60.64.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch" }, "product_reference": "kernel-devel-3.12.69-60.64.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.69-60.64.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch" }, "product_reference": "kernel-macros-3.12.69-60.64.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.69-60.64.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch" }, "product_reference": "kernel-source-3.12.69-60.64.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.69-60.64.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le" }, "product_reference": "kernel-syms-3.12.69-60.64.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.69-60.64.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x" }, "product_reference": "kernel-syms-3.12.69-60.64.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-syms-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-xen-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.69-60.64.29.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.69-60.64.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-8962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8962" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8962", "url": "https://www.suse.com/security/cve/CVE-2015-8962" }, { "category": "external", "summary": "SUSE Bug 1010501 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1010501" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "important" } ], "title": "CVE-2015-8962" }, { "cve": "CVE-2015-8963", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8963" } ], "notes": [ { "category": "general", "text": "Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8963", "url": "https://www.suse.com/security/cve/CVE-2015-8963" }, { "category": "external", "summary": "SUSE Bug 1010502 for CVE-2015-8963", "url": "https://bugzilla.suse.com/1010502" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "important" } ], "title": "CVE-2015-8963" }, { "cve": "CVE-2015-8964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8964" } ], "notes": [ { "category": "general", "text": "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8964", "url": "https://www.suse.com/security/cve/CVE-2015-8964" }, { "category": "external", "summary": "SUSE Bug 1010507 for CVE-2015-8964", "url": "https://bugzilla.suse.com/1010507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "low" } ], "title": "CVE-2015-8964" }, { "cve": "CVE-2016-10088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10088" } ], "notes": [ { "category": "general", "text": "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10088", "url": "https://www.suse.com/security/cve/CVE-2016-10088" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "important" } ], "title": "CVE-2016-10088" }, { "cve": "CVE-2016-7910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7910" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7910", "url": "https://www.suse.com/security/cve/CVE-2016-7910" }, { "category": "external", "summary": "SUSE Bug 1010716 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1010716" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1196722 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1196722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "important" } ], "title": "CVE-2016-7910" }, { "cve": "CVE-2016-7911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7911" } ], "notes": [ { "category": "general", "text": "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7911", "url": "https://www.suse.com/security/cve/CVE-2016-7911" }, { "category": "external", "summary": "SUSE Bug 1010711 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010711" }, { "category": "external", "summary": "SUSE Bug 1010713 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010713" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "moderate" } ], "title": "CVE-2016-7911" }, { "cve": "CVE-2016-7913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7913" } ], "notes": [ { "category": "general", "text": "The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7913", "url": "https://www.suse.com/security/cve/CVE-2016-7913" }, { "category": "external", "summary": "SUSE Bug 1010478 for CVE-2016-7913", "url": "https://bugzilla.suse.com/1010478" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "important" } ], "title": "CVE-2016-7913" }, { "cve": "CVE-2016-7914", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7914" } ], "notes": [ { "category": "general", "text": "The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7914", "url": "https://www.suse.com/security/cve/CVE-2016-7914" }, { "category": "external", "summary": "SUSE Bug 1010475 for CVE-2016-7914", "url": "https://bugzilla.suse.com/1010475" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "moderate" } ], "title": "CVE-2016-7914" }, { "cve": "CVE-2016-8399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8399" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8399", "url": "https://www.suse.com/security/cve/CVE-2016-8399" }, { "category": "external", "summary": "SUSE Bug 1014746 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1014746" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "moderate" } ], "title": "CVE-2016-8399" }, { "cve": "CVE-2016-8633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8633" } ], "notes": [ { "category": "general", "text": "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8633", "url": "https://www.suse.com/security/cve/CVE-2016-8633" }, { "category": "external", "summary": "SUSE Bug 1008833 for CVE-2016-8633", "url": "https://bugzilla.suse.com/1008833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "moderate" } ], "title": "CVE-2016-8633" }, { "cve": "CVE-2016-8645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8645" } ], "notes": [ { "category": "general", "text": "The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8645", "url": "https://www.suse.com/security/cve/CVE-2016-8645" }, { "category": "external", "summary": "SUSE Bug 1009969 for CVE-2016-8645", "url": "https://bugzilla.suse.com/1009969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "moderate" } ], "title": "CVE-2016-8645" }, { "cve": "CVE-2016-9083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9083" } ], "notes": [ { "category": "general", "text": "drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a \"state machine confusion bug.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9083", "url": "https://www.suse.com/security/cve/CVE-2016-9083" }, { "category": "external", "summary": "SUSE Bug 1007197 for CVE-2016-9083", "url": "https://bugzilla.suse.com/1007197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "low" } ], "title": "CVE-2016-9083" }, { "cve": "CVE-2016-9084", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9084" } ], "notes": [ { "category": "general", "text": "drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11 misuses the kzalloc function, which allows local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9084", "url": "https://www.suse.com/security/cve/CVE-2016-9084" }, { "category": "external", "summary": "SUSE Bug 1007197 for CVE-2016-9084", "url": "https://bugzilla.suse.com/1007197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "low" } ], "title": "CVE-2016-9084" }, { "cve": "CVE-2016-9756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9756" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9756", "url": "https://www.suse.com/security/cve/CVE-2016-9756" }, { "category": "external", "summary": "SUSE Bug 1013038 for CVE-2016-9756", "url": "https://bugzilla.suse.com/1013038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "moderate" } ], "title": "CVE-2016-9756" }, { "cve": "CVE-2016-9793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9793" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9793", "url": "https://www.suse.com/security/cve/CVE-2016-9793" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "moderate" } ], "title": "CVE-2016-9793" }, { "cve": "CVE-2016-9806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9806" } ], "notes": [ { "category": "general", "text": "Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before 4.6.3 allows local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that makes sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9806", "url": "https://www.suse.com/security/cve/CVE-2016-9806" }, { "category": "external", "summary": "SUSE Bug 1013540 for CVE-2016-9806", "url": "https://bugzilla.suse.com/1013540" }, { "category": "external", "summary": "SUSE Bug 1017589 for CVE-2016-9806", "url": "https://bugzilla.suse.com/1017589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "important" } ], "title": "CVE-2016-9806" }, { "cve": "CVE-2017-2583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2583" } ], "notes": [ { "category": "general", "text": "The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a \"MOV SS, NULL selector\" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2583", "url": "https://www.suse.com/security/cve/CVE-2017-2583" }, { "category": "external", "summary": "SUSE Bug 1020602 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1020602" }, { "category": "external", "summary": "SUSE Bug 1030573 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1030573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "moderate" } ], "title": "CVE-2017-2583" }, { "cve": "CVE-2017-2584", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2584" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2584", "url": "https://www.suse.com/security/cve/CVE-2017-2584" }, { "category": "external", "summary": "SUSE Bug 1019851 for CVE-2017-2584", "url": "https://bugzilla.suse.com/1019851" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2584", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "moderate" } ], "title": "CVE-2017-2584" }, { "cve": "CVE-2017-5551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5551" } ], "notes": [ { "category": "general", "text": "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5551", "url": "https://www.suse.com/security/cve/CVE-2017-5551" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2017-5551", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2017-5551", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_69-60_64_29-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.69-60.64.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.69-60.64.29.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.69-60.64.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.69-60.64.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T19:07:43Z", "details": "moderate" } ], "title": "CVE-2017-5551" } ] }
suse-su-2017:0471-1
Vulnerability from csaf_suse
Published
2017-02-15 16:20
Modified
2017-02-15 16:20
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 GA LTSS kernel was updated to 3.12.61 to receive various security and bugfixes.
The following feature was implemented:
- The ext2 filesystem got reenabled and supported to allow support for 'XIP' (Execute In Place) (FATE#320805).
The following security bugs were fixed:
- CVE-2017-5551: The tmpfs filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#1021258).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2017-2583: A Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. A user/process inside guest could have used this flaw to crash the guest resulting in DoS or potentially escalate their privileges inside guest. (bsc#1020602).
- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt (bnc#1019851).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935 (bnc#1014746).
- CVE-2016-9806: Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that made sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated (bnc#1013540).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation (bnc#1010502).
- CVE-2016-7914: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite (bnc#1010475).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a 'state machine confusion bug (bnc#1007197).
- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel misused the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bnc#1004462).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation (bnc#994748).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a 'double fetch' vulnerability (bnc#987542).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362 bnc#986365).
- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569).
- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
The following non-security bugs were fixed:
- base: make module_create_drivers_dir race-free (bnc#983977).
- btrfs-8448-improve-performance-on-fsync-against-new-inode.patch: Disable (bsc#981597).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: be more precise on errors when getting an inode from disk (bsc#981038).
- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#994881).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- btrfs: fix relocation incorrectly dropping data references (bsc#990384).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).
- btrfs: increment ctx->pos for every emitted or skipped dirent in readdir (bsc#981709).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- ext4: Fixup handling for custom configs in tuning.
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257)
- ipv6: KABI workaround for ipv6: add complete rcu protection around np->opt.
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- kabi: reintroduce sk_filter (kabi).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612, fate#313296).
- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410, fate#313296).
- kgr: ignore zombie tasks during the patching (bnc#1008979).
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- modsign: Print appropriate status message when accessing UEFI variable (bsc#958606).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943).
- netfilter: allow logging fron non-init netns (bsc#970083).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- pci/aer: Clear error status registers during enumeration and restore (bsc#985978).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- reiserfs: fix race in prealloc discard (bsc#987576).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: Increase REPORT_LUNS timeout (bsc#982282).
- series.conf: move stray netfilter patches to the right section
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- supported.conf: Add ext2
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tty: audit: Fix audit source (bsc#1016482).
- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- xen: Fix refcnt regression in xen netback introduced by changes made for bug#881008 (bnc#978094)
- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).
- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).
- xfs: fix premature enospc on inode allocation (bsc#984148).
- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).
- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).
- xfs: refactor xlog_recover_process_data() (bsc#1019300).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: silence warnings in switch (bnc#991665).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2017-247,SUSE-SLE-SAP-12-2017-247,SUSE-SLE-SERVER-12-2017-247
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to 3.12.61 to receive various security and bugfixes.\n\nThe following feature was implemented:\n\n- The ext2 filesystem got reenabled and supported to allow support for \u0027XIP\u0027 (Execute In Place) (FATE#320805).\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-5551: The tmpfs filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#1021258).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).\n- CVE-2017-2583: A Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. A user/process inside guest could have used this flaw to crash the guest resulting in DoS or potentially escalate their privileges inside guest. (bsc#1020602).\n- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt (bnc#1019851).\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).\n- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935 (bnc#1014746).\n- CVE-2016-9806: Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that made sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated (bnc#1013540).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).\n- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation (bnc#1010502).\n- CVE-2016-7914: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite (bnc#1010475).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).\n- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a \u0027state machine confusion bug (bnc#1007197).\n- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel misused the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197).\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).\n- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).\n- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bnc#1004462).\n- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).\n- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation (bnc#994748).\n- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).\n- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \u0027double fetch\u0027 vulnerability (bnc#987542).\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bnc#991608).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362 bnc#986365).\n- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569).\n- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n\nThe following non-security bugs were fixed:\n\n- base: make module_create_drivers_dir race-free (bnc#983977).\n- btrfs-8448-improve-performance-on-fsync-against-new-inode.patch: Disable (bsc#981597).\n- btrfs: account for non-CoW\u0027d blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: be more precise on errors when getting an inode from disk (bsc#981038).\n- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#994881).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- btrfs: fix relocation incorrectly dropping data references (bsc#990384).\n- btrfs: handle quota reserve failure properly (bsc#1005666).\n- btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).\n- btrfs: increment ctx-\u003epos for every emitted or skipped dirent in readdir (bsc#981709).\n- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)\n- ext4: Add parameter for tuning handling of ext2 (bsc#976195).\n- ext4: Fixup handling for custom configs in tuning.\n- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).\n- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257)\n- ipv6: KABI workaround for ipv6: add complete rcu protection around np-\u003eopt.\n- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).\n- kabi: reintroduce sk_filter (kabi).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612, fate#313296).\n- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410, fate#313296).\n- kgr: ignore zombie tasks during the patching (bnc#1008979).\n- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- modsign: Print appropriate status message when accessing UEFI variable (bsc#958606).\n- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).\n- mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943).\n- netfilter: allow logging fron non-init netns (bsc#970083).\n- netfilter: bridge: do not leak skb in error paths (bsc#982544).\n- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).\n- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).\n- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- pci/aer: Clear error status registers during enumeration and restore (bsc#985978).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: Increase REPORT_LUNS timeout (bsc#982282).\n- series.conf: move stray netfilter patches to the right section\n- squashfs3: properly handle dir_emit() failures (bsc#998795).\n- supported.conf: Add ext2\n- timers: Use proper base migration in add_timer_on() (bnc#993392).\n- tty: audit: Fix audit source (bsc#1016482).\n- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- xen: Fix refcnt regression in xen netback introduced by changes made for bug#881008 (bnc#978094)\n- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).\n- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).\n- xfs: fix premature enospc on inode allocation (bsc#984148).\n- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).\n- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).\n- xfs: refactor xlog_recover_process_data() (bsc#1019300).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n- xhci: silence warnings in switch (bnc#991665).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-12-2017-247,SUSE-SLE-SAP-12-2017-247,SUSE-SLE-SERVER-12-2017-247", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0471-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0471-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0471-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" }, { "category": "self", "summary": "SUSE Bug 1003153", "url": "https://bugzilla.suse.com/1003153" }, { "category": "self", "summary": "SUSE Bug 1003925", "url": "https://bugzilla.suse.com/1003925" }, { "category": "self", "summary": "SUSE Bug 1004462", "url": "https://bugzilla.suse.com/1004462" }, { "category": "self", "summary": "SUSE Bug 1004517", "url": "https://bugzilla.suse.com/1004517" }, { "category": "self", "summary": "SUSE Bug 1005666", "url": "https://bugzilla.suse.com/1005666" }, { "category": "self", "summary": "SUSE Bug 1007197", "url": "https://bugzilla.suse.com/1007197" }, { "category": "self", "summary": "SUSE Bug 1008833", "url": "https://bugzilla.suse.com/1008833" }, { "category": "self", "summary": "SUSE Bug 1008979", "url": "https://bugzilla.suse.com/1008979" }, { "category": "self", "summary": "SUSE Bug 1009969", "url": "https://bugzilla.suse.com/1009969" }, { "category": "self", "summary": "SUSE Bug 1010040", "url": "https://bugzilla.suse.com/1010040" }, { "category": "self", "summary": "SUSE Bug 1010475", "url": "https://bugzilla.suse.com/1010475" }, { "category": "self", "summary": "SUSE Bug 1010478", "url": "https://bugzilla.suse.com/1010478" }, { "category": "self", "summary": "SUSE Bug 1010501", "url": "https://bugzilla.suse.com/1010501" }, { "category": "self", "summary": "SUSE Bug 1010502", "url": "https://bugzilla.suse.com/1010502" }, { "category": "self", "summary": "SUSE Bug 1010507", "url": "https://bugzilla.suse.com/1010507" }, { "category": "self", "summary": "SUSE Bug 1010612", "url": "https://bugzilla.suse.com/1010612" }, { "category": "self", "summary": "SUSE Bug 1010711", "url": "https://bugzilla.suse.com/1010711" }, { "category": "self", "summary": "SUSE Bug 1010716", "url": "https://bugzilla.suse.com/1010716" }, { "category": "self", "summary": "SUSE Bug 1011820", "url": "https://bugzilla.suse.com/1011820" }, { "category": "self", "summary": "SUSE Bug 1012422", "url": "https://bugzilla.suse.com/1012422" }, { "category": "self", "summary": "SUSE Bug 1013038", "url": "https://bugzilla.suse.com/1013038" }, { "category": "self", "summary": "SUSE Bug 1013531", "url": "https://bugzilla.suse.com/1013531" }, { "category": "self", "summary": "SUSE Bug 1013540", "url": "https://bugzilla.suse.com/1013540" }, { "category": "self", "summary": "SUSE Bug 1013542", "url": "https://bugzilla.suse.com/1013542" }, { "category": "self", "summary": "SUSE Bug 1014746", "url": "https://bugzilla.suse.com/1014746" }, { "category": "self", "summary": "SUSE Bug 1016482", "url": "https://bugzilla.suse.com/1016482" }, { "category": "self", "summary": "SUSE Bug 1017410", "url": "https://bugzilla.suse.com/1017410" }, { "category": "self", "summary": "SUSE Bug 1017589", "url": "https://bugzilla.suse.com/1017589" }, { "category": "self", "summary": "SUSE Bug 1017710", "url": "https://bugzilla.suse.com/1017710" }, { "category": "self", "summary": "SUSE Bug 1019300", "url": "https://bugzilla.suse.com/1019300" }, { "category": "self", "summary": "SUSE Bug 1019851", "url": "https://bugzilla.suse.com/1019851" }, { "category": "self", "summary": "SUSE Bug 1020602", "url": "https://bugzilla.suse.com/1020602" }, { "category": "self", "summary": "SUSE Bug 1021258", "url": "https://bugzilla.suse.com/1021258" }, { "category": "self", "summary": "SUSE Bug 881008", "url": "https://bugzilla.suse.com/881008" }, { "category": "self", "summary": "SUSE Bug 915183", "url": "https://bugzilla.suse.com/915183" }, { "category": "self", "summary": "SUSE Bug 958606", "url": "https://bugzilla.suse.com/958606" }, { "category": "self", "summary": "SUSE Bug 961257", "url": "https://bugzilla.suse.com/961257" }, { "category": "self", "summary": "SUSE Bug 970083", "url": "https://bugzilla.suse.com/970083" }, { "category": "self", "summary": "SUSE Bug 971989", "url": "https://bugzilla.suse.com/971989" }, { "category": "self", "summary": "SUSE Bug 976195", "url": "https://bugzilla.suse.com/976195" }, { "category": "self", "summary": "SUSE Bug 978094", "url": "https://bugzilla.suse.com/978094" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 980560", "url": "https://bugzilla.suse.com/980560" }, { "category": "self", "summary": "SUSE Bug 981038", "url": "https://bugzilla.suse.com/981038" }, { "category": "self", "summary": "SUSE Bug 981597", "url": "https://bugzilla.suse.com/981597" }, { "category": "self", "summary": "SUSE Bug 981709", "url": "https://bugzilla.suse.com/981709" }, { "category": "self", "summary": "SUSE Bug 982282", "url": "https://bugzilla.suse.com/982282" }, { "category": "self", "summary": "SUSE Bug 982544", "url": "https://bugzilla.suse.com/982544" }, { "category": "self", "summary": "SUSE Bug 983619", "url": "https://bugzilla.suse.com/983619" }, { "category": "self", "summary": "SUSE Bug 983721", "url": "https://bugzilla.suse.com/983721" }, { "category": "self", "summary": "SUSE Bug 983977", "url": "https://bugzilla.suse.com/983977" }, { "category": "self", "summary": "SUSE Bug 984148", "url": "https://bugzilla.suse.com/984148" }, { "category": "self", "summary": "SUSE Bug 984419", "url": "https://bugzilla.suse.com/984419" }, { "category": "self", "summary": "SUSE Bug 984755", "url": "https://bugzilla.suse.com/984755" }, { "category": "self", "summary": "SUSE Bug 985978", "url": "https://bugzilla.suse.com/985978" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 986569", "url": "https://bugzilla.suse.com/986569" }, { "category": "self", "summary": "SUSE Bug 986572", "url": "https://bugzilla.suse.com/986572" }, { "category": "self", "summary": "SUSE Bug 986811", "url": "https://bugzilla.suse.com/986811" }, { "category": "self", "summary": "SUSE Bug 986941", "url": "https://bugzilla.suse.com/986941" }, { "category": "self", "summary": "SUSE Bug 987542", "url": "https://bugzilla.suse.com/987542" }, { "category": "self", "summary": "SUSE Bug 987565", "url": "https://bugzilla.suse.com/987565" }, { "category": "self", "summary": "SUSE Bug 987576", "url": "https://bugzilla.suse.com/987576" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 990384", "url": "https://bugzilla.suse.com/990384" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE Bug 991665", "url": "https://bugzilla.suse.com/991665" }, { "category": "self", "summary": "SUSE Bug 993392", "url": "https://bugzilla.suse.com/993392" }, { "category": "self", "summary": "SUSE Bug 993890", "url": "https://bugzilla.suse.com/993890" }, { "category": "self", "summary": "SUSE Bug 993891", "url": "https://bugzilla.suse.com/993891" }, { "category": "self", "summary": "SUSE Bug 994296", "url": "https://bugzilla.suse.com/994296" }, { "category": "self", "summary": "SUSE Bug 994748", "url": "https://bugzilla.suse.com/994748" }, { "category": "self", "summary": "SUSE Bug 994881", "url": "https://bugzilla.suse.com/994881" }, { "category": "self", "summary": "SUSE Bug 995968", "url": "https://bugzilla.suse.com/995968" }, { "category": "self", "summary": "SUSE Bug 997708", "url": "https://bugzilla.suse.com/997708" }, { "category": "self", "summary": "SUSE Bug 998795", "url": "https://bugzilla.suse.com/998795" }, { "category": "self", "summary": "SUSE Bug 999584", "url": "https://bugzilla.suse.com/999584" }, { "category": "self", "summary": "SUSE Bug 999600", "url": "https://bugzilla.suse.com/999600" }, { "category": "self", "summary": "SUSE Bug 999932", "url": "https://bugzilla.suse.com/999932" }, { "category": "self", "summary": "SUSE Bug 999943", "url": "https://bugzilla.suse.com/999943" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9904 page", "url": "https://www.suse.com/security/cve/CVE-2014-9904/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8956 page", "url": "https://www.suse.com/security/cve/CVE-2015-8956/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8962 page", "url": "https://www.suse.com/security/cve/CVE-2015-8962/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8963 page", "url": "https://www.suse.com/security/cve/CVE-2015-8963/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8964 page", "url": "https://www.suse.com/security/cve/CVE-2015-8964/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10088 page", "url": "https://www.suse.com/security/cve/CVE-2016-10088/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5828 page", "url": "https://www.suse.com/security/cve/CVE-2016-5828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6130 page", "url": "https://www.suse.com/security/cve/CVE-2016-6130/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6327 page", "url": "https://www.suse.com/security/cve/CVE-2016-6327/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7097 page", "url": "https://www.suse.com/security/cve/CVE-2016-7097/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7910 page", "url": "https://www.suse.com/security/cve/CVE-2016-7910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7911 page", "url": "https://www.suse.com/security/cve/CVE-2016-7911/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7913 page", "url": "https://www.suse.com/security/cve/CVE-2016-7913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7914 page", "url": "https://www.suse.com/security/cve/CVE-2016-7914/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8399 page", "url": "https://www.suse.com/security/cve/CVE-2016-8399/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8633 page", "url": "https://www.suse.com/security/cve/CVE-2016-8633/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8645 page", "url": "https://www.suse.com/security/cve/CVE-2016-8645/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8658 page", "url": "https://www.suse.com/security/cve/CVE-2016-8658/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9083 page", "url": "https://www.suse.com/security/cve/CVE-2016-9083/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9084 page", "url": "https://www.suse.com/security/cve/CVE-2016-9084/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9756 page", "url": "https://www.suse.com/security/cve/CVE-2016-9756/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9793 page", "url": "https://www.suse.com/security/cve/CVE-2016-9793/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9806 page", "url": "https://www.suse.com/security/cve/CVE-2016-9806/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2583 page", "url": "https://www.suse.com/security/cve/CVE-2017-2583/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2584 page", "url": "https://www.suse.com/security/cve/CVE-2017-2584/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5551 page", "url": "https://www.suse.com/security/cve/CVE-2017-5551/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-02-15T16:20:32Z", "generator": { "date": "2017-02-15T16:20:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0471-1", "initial_release_date": "2017-02-15T16:20:32Z", "revision_history": [ { "date": "2017-02-15T16:20:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.61-52.66.1.noarch", "product": { "name": "kernel-devel-3.12.61-52.66.1.noarch", "product_id": "kernel-devel-3.12.61-52.66.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.61-52.66.1.noarch", "product": { "name": "kernel-macros-3.12.61-52.66.1.noarch", "product_id": "kernel-macros-3.12.61-52.66.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.61-52.66.1.noarch", "product": { "name": "kernel-source-3.12.61-52.66.1.noarch", "product_id": "kernel-source-3.12.61-52.66.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.66.1.ppc64le", "product": { "name": "kernel-default-3.12.61-52.66.1.ppc64le", "product_id": "kernel-default-3.12.61-52.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.66.1.ppc64le", "product": { "name": "kernel-default-base-3.12.61-52.66.1.ppc64le", "product_id": "kernel-default-base-3.12.61-52.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.66.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.61-52.66.1.ppc64le", "product_id": "kernel-default-devel-3.12.61-52.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.66.1.ppc64le", "product": { "name": "kernel-syms-3.12.61-52.66.1.ppc64le", "product_id": "kernel-syms-3.12.61-52.66.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.66.1.s390x", "product": { "name": "kernel-default-3.12.61-52.66.1.s390x", "product_id": "kernel-default-3.12.61-52.66.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.66.1.s390x", "product": { "name": "kernel-default-base-3.12.61-52.66.1.s390x", "product_id": "kernel-default-base-3.12.61-52.66.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.66.1.s390x", "product": { "name": "kernel-default-devel-3.12.61-52.66.1.s390x", "product_id": "kernel-default-devel-3.12.61-52.66.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.61-52.66.1.s390x", "product": { "name": "kernel-default-man-3.12.61-52.66.1.s390x", "product_id": "kernel-default-man-3.12.61-52.66.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.66.1.s390x", "product": { "name": "kernel-syms-3.12.61-52.66.1.s390x", "product_id": "kernel-syms-3.12.61-52.66.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-ec2-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-ec2-3.12.61-52.66.1.x86_64", "product_id": "kernel-ec2-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.61-52.66.1.x86_64", "product_id": "kernel-ec2-devel-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.61-52.66.1.x86_64", "product_id": "kernel-ec2-extra-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-default-3.12.61-52.66.1.x86_64", "product_id": "kernel-default-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-default-base-3.12.61-52.66.1.x86_64", "product_id": "kernel-default-base-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-default-devel-3.12.61-52.66.1.x86_64", "product_id": "kernel-default-devel-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-syms-3.12.61-52.66.1.x86_64", "product_id": "kernel-syms-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-xen-3.12.61-52.66.1.x86_64", "product_id": "kernel-xen-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-xen-base-3.12.61-52.66.1.x86_64", "product_id": "kernel-xen-base-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.61-52.66.1.x86_64", "product_id": "kernel-xen-devel-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-ec2-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-base-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-devel-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-macros-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-source-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-syms-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.66.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le" }, "product_reference": "kernel-default-3.12.61-52.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x" }, "product_reference": "kernel-default-3.12.61-52.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.66.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.61-52.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x" }, "product_reference": "kernel-default-base-3.12.61-52.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-base-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.66.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.61-52.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x" }, "product_reference": "kernel-default-devel-3.12.61-52.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x" }, "product_reference": "kernel-default-man-3.12.61-52.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-devel-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-macros-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-source-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.66.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le" }, "product_reference": "kernel-syms-3.12.61-52.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x" }, "product_reference": "kernel-syms-3.12.61-52.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-syms-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9904" } ], "notes": [ { "category": "general", "text": "The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9904", "url": "https://www.suse.com/security/cve/CVE-2014-9904" }, { "category": "external", "summary": "SUSE Bug 986811 for CVE-2014-9904", "url": "https://bugzilla.suse.com/986811" }, { "category": "external", "summary": "SUSE Bug 986941 for CVE-2014-9904", "url": "https://bugzilla.suse.com/986941" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2014-9904" }, { "cve": "CVE-2015-8956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8956" } ], "notes": [ { "category": "general", "text": "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8956", "url": "https://www.suse.com/security/cve/CVE-2015-8956" }, { "category": "external", "summary": "SUSE Bug 1003925 for CVE-2015-8956", "url": "https://bugzilla.suse.com/1003925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2015-8956" }, { "cve": "CVE-2015-8962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8962" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8962", "url": "https://www.suse.com/security/cve/CVE-2015-8962" }, { "category": "external", "summary": "SUSE Bug 1010501 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1010501" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2015-8962" }, { "cve": "CVE-2015-8963", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8963" } ], "notes": [ { "category": "general", "text": "Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8963", "url": "https://www.suse.com/security/cve/CVE-2015-8963" }, { "category": "external", "summary": "SUSE Bug 1010502 for CVE-2015-8963", "url": "https://bugzilla.suse.com/1010502" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2015-8963" }, { "cve": "CVE-2015-8964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8964" } ], "notes": [ { "category": "general", "text": "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8964", "url": "https://www.suse.com/security/cve/CVE-2015-8964" }, { "category": "external", "summary": "SUSE Bug 1010507 for CVE-2015-8964", "url": "https://bugzilla.suse.com/1010507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2015-8964" }, { "cve": "CVE-2016-10088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10088" } ], "notes": [ { "category": "general", "text": "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10088", "url": "https://www.suse.com/security/cve/CVE-2016-10088" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2016-10088" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-5828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5828" } ], "notes": [ { "category": "general", "text": "The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5828", "url": "https://www.suse.com/security/cve/CVE-2016-5828" }, { "category": "external", "summary": "SUSE Bug 986569 for CVE-2016-5828", "url": "https://bugzilla.suse.com/986569" }, { "category": "external", "summary": "SUSE Bug 991065 for CVE-2016-5828", "url": "https://bugzilla.suse.com/991065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-5828" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6130" } ], "notes": [ { "category": "general", "text": "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6130", "url": "https://www.suse.com/security/cve/CVE-2016-6130" }, { "category": "external", "summary": "SUSE Bug 987542 for CVE-2016-6130", "url": "https://bugzilla.suse.com/987542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-6130" }, { "cve": "CVE-2016-6327", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6327" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6327", "url": "https://www.suse.com/security/cve/CVE-2016-6327" }, { "category": "external", "summary": "SUSE Bug 994748 for CVE-2016-6327", "url": "https://bugzilla.suse.com/994748" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-6327" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7097" } ], "notes": [ { "category": "general", "text": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7097", "url": "https://www.suse.com/security/cve/CVE-2016-7097" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-7097", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2016-7097", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-7097" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-7425" }, { "cve": "CVE-2016-7910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7910" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7910", "url": "https://www.suse.com/security/cve/CVE-2016-7910" }, { "category": "external", "summary": "SUSE Bug 1010716 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1010716" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1196722 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1196722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2016-7910" }, { "cve": "CVE-2016-7911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7911" } ], "notes": [ { "category": "general", "text": "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7911", "url": "https://www.suse.com/security/cve/CVE-2016-7911" }, { "category": "external", "summary": "SUSE Bug 1010711 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010711" }, { "category": "external", "summary": "SUSE Bug 1010713 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010713" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-7911" }, { "cve": "CVE-2016-7913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7913" } ], "notes": [ { "category": "general", "text": "The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7913", "url": "https://www.suse.com/security/cve/CVE-2016-7913" }, { "category": "external", "summary": "SUSE Bug 1010478 for CVE-2016-7913", "url": "https://bugzilla.suse.com/1010478" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2016-7913" }, { "cve": "CVE-2016-7914", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7914" } ], "notes": [ { "category": "general", "text": "The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7914", "url": "https://www.suse.com/security/cve/CVE-2016-7914" }, { "category": "external", "summary": "SUSE Bug 1010475 for CVE-2016-7914", "url": "https://bugzilla.suse.com/1010475" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-7914" }, { "cve": "CVE-2016-8399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8399" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8399", "url": "https://www.suse.com/security/cve/CVE-2016-8399" }, { "category": "external", "summary": "SUSE Bug 1014746 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1014746" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-8399" }, { "cve": "CVE-2016-8633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8633" } ], "notes": [ { "category": "general", "text": "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8633", "url": "https://www.suse.com/security/cve/CVE-2016-8633" }, { "category": "external", "summary": "SUSE Bug 1008833 for CVE-2016-8633", "url": "https://bugzilla.suse.com/1008833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-8633" }, { "cve": "CVE-2016-8645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8645" } ], "notes": [ { "category": "general", "text": "The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8645", "url": "https://www.suse.com/security/cve/CVE-2016-8645" }, { "category": "external", "summary": "SUSE Bug 1009969 for CVE-2016-8645", "url": "https://bugzilla.suse.com/1009969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-8645" }, { "cve": "CVE-2016-8658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8658" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8658", "url": "https://www.suse.com/security/cve/CVE-2016-8658" }, { "category": "external", "summary": "SUSE Bug 1004462 for CVE-2016-8658", "url": "https://bugzilla.suse.com/1004462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-8658" }, { "cve": "CVE-2016-9083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9083" } ], "notes": [ { "category": "general", "text": "drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a \"state machine confusion bug.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9083", "url": "https://www.suse.com/security/cve/CVE-2016-9083" }, { "category": "external", "summary": "SUSE Bug 1007197 for CVE-2016-9083", "url": "https://bugzilla.suse.com/1007197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-9083" }, { "cve": "CVE-2016-9084", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9084" } ], "notes": [ { "category": "general", "text": "drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11 misuses the kzalloc function, which allows local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9084", "url": "https://www.suse.com/security/cve/CVE-2016-9084" }, { "category": "external", "summary": "SUSE Bug 1007197 for CVE-2016-9084", "url": "https://bugzilla.suse.com/1007197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-9084" }, { "cve": "CVE-2016-9756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9756" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9756", "url": "https://www.suse.com/security/cve/CVE-2016-9756" }, { "category": "external", "summary": "SUSE Bug 1013038 for CVE-2016-9756", "url": "https://bugzilla.suse.com/1013038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-9756" }, { "cve": "CVE-2016-9793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9793" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9793", "url": "https://www.suse.com/security/cve/CVE-2016-9793" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-9793" }, { "cve": "CVE-2016-9806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9806" } ], "notes": [ { "category": "general", "text": "Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before 4.6.3 allows local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that makes sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9806", "url": "https://www.suse.com/security/cve/CVE-2016-9806" }, { "category": "external", "summary": "SUSE Bug 1013540 for CVE-2016-9806", "url": "https://bugzilla.suse.com/1013540" }, { "category": "external", "summary": "SUSE Bug 1017589 for CVE-2016-9806", "url": "https://bugzilla.suse.com/1017589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2016-9806" }, { "cve": "CVE-2017-2583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2583" } ], "notes": [ { "category": "general", "text": "The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a \"MOV SS, NULL selector\" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2583", "url": "https://www.suse.com/security/cve/CVE-2017-2583" }, { "category": "external", "summary": "SUSE Bug 1020602 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1020602" }, { "category": "external", "summary": "SUSE Bug 1030573 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1030573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2017-2583" }, { "cve": "CVE-2017-2584", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2584" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2584", "url": "https://www.suse.com/security/cve/CVE-2017-2584" }, { "category": "external", "summary": "SUSE Bug 1019851 for CVE-2017-2584", "url": "https://bugzilla.suse.com/1019851" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2584", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2017-2584" }, { "cve": "CVE-2017-5551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5551" } ], "notes": [ { "category": "general", "text": "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5551", "url": "https://www.suse.com/security/cve/CVE-2017-5551" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2017-5551", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2017-5551", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2017-5551" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…