Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-1583 (GCVE-0-2016-1583)
Vulnerability from cvelistv5
Published
2016-06-27 10:00
Modified
2024-08-05 23:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:02:11.789Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3006-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3006-1" }, { "name": "USN-3004-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3004-1" }, { "name": "SUSE-SU-2016:2010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d" }, { "name": "RHSA-2016:2766", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2766.html" }, { "name": "USN-3001-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3001-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3" }, { "name": "SUSE-SU-2016:1696", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d" }, { "name": "SUSE-SU-2016:1994", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" }, { "name": "39992", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/39992/" }, { "name": "SUSE-SU-2016:1961", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" }, { "name": "USN-3005-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3005-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=836" }, { "name": "SUSE-SU-2016:1985", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" }, { "name": "91157", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91157" }, { "name": "openSUSE-SU-2016:2184", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" }, { "name": "USN-2999-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2999-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87" }, { "name": "SUSE-SU-2016:2006", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" }, { "name": "[oss-security] 20160610 [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/10/8" }, { "name": "SUSE-SU-2016:2014", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" }, { "name": "openSUSE-SU-2016:1641", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" }, { "name": "USN-2997-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2997-1" }, { "name": "USN-3000-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3000-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b" }, { "name": "DSA-3607", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3607" }, { "name": "1036763", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036763" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/2f36db71009304b3f0b95afacd8eba1f9f046b87" }, { "name": "USN-3002-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3002-1" }, { "name": "USN-2996-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2996-1" }, { "name": "SUSE-SU-2016:1672", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" }, { "name": "SUSE-SU-2016:2009", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" }, { "name": "SUSE-SU-2016:1596", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00027.html" }, { "name": "RHSA-2017:2760", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2760" }, { "name": "SUSE-SU-2016:2005", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" }, { "name": "SUSE-SU-2016:2007", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" }, { "name": "USN-3007-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3007-1" }, { "name": "SUSE-SU-2016:2000", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" }, { "name": "RHSA-2016:2124", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html" }, { "name": "USN-3003-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3003-1" }, { "name": "SUSE-SU-2016:1995", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" }, { "name": "SUSE-SU-2016:2105", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" }, { "name": "[oss-security] 20160622 Re: [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/22/1" }, { "name": "SUSE-SU-2016:2002", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721" }, { "name": "USN-2998-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2998-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html" }, { "name": "USN-3008-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3008-1" }, { "name": "SUSE-SU-2016:1937", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-06T21:57:01", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "name": "USN-3006-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3006-1" }, { "name": "USN-3004-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3004-1" }, { "name": "SUSE-SU-2016:2010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d" }, { "name": "RHSA-2016:2766", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2766.html" }, { "name": "USN-3001-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3001-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3" }, { "name": "SUSE-SU-2016:1696", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d" }, { "name": "SUSE-SU-2016:1994", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" }, { "name": "39992", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/39992/" }, { "name": "SUSE-SU-2016:1961", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" }, { "name": "USN-3005-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3005-1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=836" }, { "name": "SUSE-SU-2016:1985", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" }, { "name": "91157", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91157" }, { "name": "openSUSE-SU-2016:2184", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" }, { "name": "USN-2999-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2999-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87" }, { "name": "SUSE-SU-2016:2006", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" }, { "name": "[oss-security] 20160610 [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/10/8" }, { "name": "SUSE-SU-2016:2014", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" }, { "name": "openSUSE-SU-2016:1641", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" }, { "name": "USN-2997-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2997-1" }, { "name": "USN-3000-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3000-1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b" }, { "name": "DSA-3607", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3607" }, { "name": "1036763", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036763" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/2f36db71009304b3f0b95afacd8eba1f9f046b87" }, { "name": "USN-3002-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3002-1" }, { "name": "USN-2996-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2996-1" }, { "name": "SUSE-SU-2016:1672", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" }, { "name": "SUSE-SU-2016:2009", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" }, { "name": "SUSE-SU-2016:1596", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00027.html" }, { "name": "RHSA-2017:2760", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2760" }, { "name": "SUSE-SU-2016:2005", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" }, { "name": "SUSE-SU-2016:2007", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" }, { "name": "USN-3007-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3007-1" }, { "name": "SUSE-SU-2016:2000", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" }, { "name": "RHSA-2016:2124", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html" }, { "name": "USN-3003-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3003-1" }, { "name": "SUSE-SU-2016:1995", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" }, { "name": "SUSE-SU-2016:2105", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" }, { "name": "[oss-security] 20160622 Re: [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/22/1" }, { "name": "SUSE-SU-2016:2002", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721" }, { "name": "USN-2998-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2998-1" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html" }, { "name": "USN-3008-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3008-1" }, { "name": "SUSE-SU-2016:1937", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "ID": "CVE-2016-1583", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3006-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3006-1" }, { "name": "USN-3004-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3004-1" }, { "name": "SUSE-SU-2016:2010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" }, { "name": "https://github.com/torvalds/linux/commit/f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d" }, { "name": "RHSA-2016:2766", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2766.html" }, { "name": "USN-3001-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3001-1" }, { "name": "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3", "refsource": "CONFIRM", "url": "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3" }, { "name": "SUSE-SU-2016:1696", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d" }, { "name": "SUSE-SU-2016:1994", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" }, { "name": "39992", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/39992/" }, { "name": "SUSE-SU-2016:1961", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" }, { "name": "USN-3005-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3005-1" }, { "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=836", "refsource": "MISC", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=836" }, { "name": "SUSE-SU-2016:1985", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" }, { "name": "91157", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91157" }, { "name": "openSUSE-SU-2016:2184", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" }, { "name": "USN-2999-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2999-1" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87" }, { "name": "SUSE-SU-2016:2006", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" }, { "name": "[oss-security] 20160610 [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/06/10/8" }, { "name": "SUSE-SU-2016:2014", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" }, { "name": "openSUSE-SU-2016:1641", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" }, { "name": "USN-2997-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2997-1" }, { "name": "USN-3000-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3000-1" }, { "name": "https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b" }, { "name": "DSA-3607", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3607" }, { "name": "1036763", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036763" }, { "name": "https://github.com/torvalds/linux/commit/2f36db71009304b3f0b95afacd8eba1f9f046b87", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/2f36db71009304b3f0b95afacd8eba1f9f046b87" }, { "name": "USN-3002-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3002-1" }, { "name": "USN-2996-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2996-1" }, { "name": "SUSE-SU-2016:1672", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" }, { "name": "SUSE-SU-2016:2009", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" }, { "name": "SUSE-SU-2016:1596", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00027.html" }, { "name": "RHSA-2017:2760", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2760" }, { "name": "SUSE-SU-2016:2005", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" }, { "name": "SUSE-SU-2016:2007", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" }, { "name": "USN-3007-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3007-1" }, { "name": "SUSE-SU-2016:2000", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" }, { "name": "RHSA-2016:2124", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html" }, { "name": "USN-3003-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3003-1" }, { "name": "SUSE-SU-2016:1995", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" }, { "name": "SUSE-SU-2016:2105", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" }, { "name": "[oss-security] 20160622 Re: [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/06/22/1" }, { "name": "SUSE-SU-2016:2002", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721" }, { "name": "USN-2998-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2998-1" }, { "name": "http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html" }, { "name": "USN-3008-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3008-1" }, { "name": "SUSE-SU-2016:1937", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2016-1583", "datePublished": "2016-06-27T10:00:00", "dateReserved": "2016-01-12T00:00:00", "dateUpdated": "2024-08-05T23:02:11.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-1583\",\"sourceIdentifier\":\"security@ubuntu.com\",\"published\":\"2016-06-27T10:59:03.330\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n ecryptfs_privileged_open en fs/ecryptfs/kthread.c en el kernel de Linux en versiones anteriores a 4.6.3 permite a usuarios locales obtener privilegios o provocar una denegaci\u00f3n de servicio (consumo de memoria de pila) a trav\u00e9s de vectores involucrados con llamadas mmap manipuladas para nombres de ruta /proc, que conduce a una p\u00e1gina de error recursiva manipulada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.19\",\"versionEndExcluding\":\"3.18.54\",\"matchCriteriaId\":\"931BB6A7-F5B1-4FD9-8F88-511F497C00F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.19\",\"versionEndExcluding\":\"4.4.14\",\"matchCriteriaId\":\"8BA17557-AA21-4C60-82B6-E6168D48555F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.6.3\",\"matchCriteriaId\":\"0911A351-61CB-4070-A172-8AD9BC1871AE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5FDEDA8-6F51-4945-B443-438CC987F235\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"336EC5B8-6FD8-42BB-9530-58A15238CEE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"E090E7B3-2346-463D-8A0C-8B482500CB42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA04C9F1-6257-4D82-BA0B-37DE66D94736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6359EF76-9371-4418-8694-B604CF02CF63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCAAE4A1-D542-43F3-B7FC-685BCDB248D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0441632F-40BF-432B-BB1C-6396C726C4F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8877923-3E50-4F71-B501-E6997894D07E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADE9D807-6690-4D67-A6B3-68BBC9B50153\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"81D94366-47D6-445A-A811-39327B150FCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF461FB4-8BA5-4065-9A69-DC017D3611C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F003591-0639-476C-A014-03F06A274880\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"CB66DB75-2B16-4EBF-9B93-CE49D8086E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88A537F-F4D0-46B9-9E37-965233C2A355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00027.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2124.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2766.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3607\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/10/8\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/22/1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/91157\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036763\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2996-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2997-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2998-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2999-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3000-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3001-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3002-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3003-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3004-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3005-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3006-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3007-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3008-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2760\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.chromium.org/p/project-zero/issues/detail?id=836\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1344721\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Issue Tracking\",\"VDB Entry\"]},{\"url\":\"https://github.com/torvalds/linux/commit/2f36db71009304b3f0b95afacd8eba1f9f046b87\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/39992/\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00027.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2124.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2766.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3607\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/10/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/22/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/91157\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036763\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2996-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2997-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2998-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2999-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3000-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3001-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3002-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3003-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3004-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3005-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3006-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3007-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3008-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2760\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.chromium.org/p/project-zero/issues/detail?id=836\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1344721\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"VDB Entry\"]},{\"url\":\"https://github.com/torvalds/linux/commit/2f36db71009304b3f0b95afacd8eba1f9f046b87\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/39992/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}" } }
rhsa-2016:2124
Vulnerability from csaf_redhat
Published
2016-10-28 09:28
Modified
2025-08-02 01:07
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 5.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
* It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195.
Bug Fix(es):
* In some cases, a kernel crash or file system corruption occurred when running journal mode 'ordered'. The kernel crash was caused by a null pointer dereference due to a race condition between two journal functions. The file system corruption occurred due to a race condition between the do_get_write_access() function and buffer writeout. This update fixes both race conditions. As a result, neither the kernel crash, nor the file system corruption now occur. (BZ#1067708)
* Prior to this update, some Global File System 2 (GFS2) files had incorrect time stamp values due to two problems with handling time stamps of such files. The first problem concerned the atime time stamp, which ended up with an arbitrary value ahead of the actual value, when a GFS2 file was accessed. The second problem was related to the mtime and ctime time stamp updates, which got lost when a GFS2 file was written to from one node and read from or written to from another node. With this update, a set of patches has been applied that fix these problems. As a result, the time stamps of GFS2 files are now handled correctly. (BZ#1374861)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 5.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\n* It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195.\n\nBug Fix(es):\n\n* In some cases, a kernel crash or file system corruption occurred when running journal mode \u0027ordered\u0027. The kernel crash was caused by a null pointer dereference due to a race condition between two journal functions. The file system corruption occurred due to a race condition between the do_get_write_access() function and buffer writeout. This update fixes both race conditions. As a result, neither the kernel crash, nor the file system corruption now occur. (BZ#1067708)\n\n* Prior to this update, some Global File System 2 (GFS2) files had incorrect time stamp values due to two problems with handling time stamps of such files. The first problem concerned the atime time stamp, which ended up with an arbitrary value ahead of the actual value, when a GFS2 file was accessed. The second problem was related to the mtime and ctime time stamp updates, which got lost when a GFS2 file was written to from one node and read from or written to from another node. With this update, a set of patches has been applied that fix these problems. As a result, the time stamps of GFS2 files are now handled correctly. (BZ#1374861)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2124", "url": "https://access.redhat.com/errata/RHSA-2016:2124" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1344721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721" }, { "category": "external", "summary": "1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2124.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T01:07:59+00:00", "generator": { "date": "2025-08-02T01:07:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:2124", "initial_release_date": "2016-10-28T09:28:10+00:00", "revision_history": [ { "date": "2016-10-28T09:28:10+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-10-28T09:28:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:07:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-416.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-0:2.6.18-416.el5.x86_64", "product_id": "kernel-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-416.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-416.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-416.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-416.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-416.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-416.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-0:2.6.18-416.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-416.el5.i686", "product_id": "kernel-xen-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-416.el5.i686", "product": { "name": "kernel-0:2.6.18-416.el5.i686", "product_id": "kernel-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-416.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-416.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-416.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-416.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-416.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-416.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-416.el5.i686", "product_id": "kernel-PAE-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-416.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-416.el5.i686", "product_id": "kernel-debug-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-416.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-416.el5.i686", "product_id": "kernel-devel-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-416.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-416.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-416.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-416.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-416.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-416.el5.i386", "product_id": "kernel-headers-0:2.6.18-416.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-416.el5.src", "product": { "name": "kernel-0:2.6.18-416.el5.src", "product_id": "kernel-0:2.6.18-416.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-416.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-416.el5.noarch", "product_id": "kernel-doc-0:2.6.18-416.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-416.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-416.el5.ia64", "product_id": "kernel-xen-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-0:2.6.18-416.el5.ia64", "product_id": "kernel-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-416.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-416.el5.ia64", "product_id": "kernel-debug-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-416.el5.ia64", "product_id": "kernel-devel-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-416.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-416.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-416.el5.ia64", "product_id": "kernel-headers-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-0:2.6.18-416.el5.ppc64", "product_id": "kernel-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-416.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-416.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-416.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-416.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-416.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-416.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-416.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-416.el5.ppc", "product_id": "kernel-headers-0:2.6.18-416.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-0:2.6.18-416.el5.s390x", "product_id": "kernel-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-416.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-416.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-416.el5.s390x", "product_id": "kernel-debug-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-416.el5.s390x", "product_id": "kernel-devel-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-416.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-416.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-416.el5.s390x", "product_id": "kernel-headers-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src" }, "product_reference": "kernel-0:2.6.18-416.el5.src", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-416.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-416.el5.noarch", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src" }, "product_reference": "kernel-0:2.6.18-416.el5.src", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-416.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-416.el5.noarch", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-1583", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2016-06-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1344721" } ], "notes": [ { "category": "description", "text": "It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Stack overflow via ecryptfs and /proc/$pid/environ", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 5 and 6 and may addressed in a future update.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "RHBZ#1344721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1583", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1583" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1583", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1583" } ], "release_date": "2016-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-28T09:28:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2124" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Stack overflow via ecryptfs and /proc/$pid/environ" }, { "acknowledgments": [ { "names": [ "Phil Oester" ] } ], "cve": "CVE-2016-5195", "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384344" } ], "notes": [ { "category": "description", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "RHBZ#1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-28T09:28:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2124" }, { "category": "workaround", "details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.", "product_ids": [ "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage" } ] }
rhsa-2016:2766
Vulnerability from csaf_redhat
Published
2016-11-15 19:36
Modified
2024-11-22 10:23
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important)
* It was reported that on s390x, the fork of a process with four page table levels will cause memory corruption with a variety of symptoms. All processes are created with three level page table and a limit of 4TB for the address space. If the parent process has four page table levels with a limit of 8PB, the function that duplicates the address space will try to copy memory areas outside of the address space limit for the child process. (CVE-2016-2143, Moderate)
Bug Fix(es):
* Use of a multi-threaded workload with high memory mappings sometiems caused a kernel panic, due to a race condition between the context switch and the pagetable upgrade. This update fixes the switch_mm() by using the complete asce parameter instead of the asce_bits parameter. As a result, the kernel no longer panics in the described scenario. (BZ#1377472)
* When iptables created the Transmission Control Protocol (TCP) reset packet, a kernel crash could occur due to uninitialized pointer to the TCP header within the Socket Buffer (SKB). This update fixes the transport header pointer in TCP reset for both IPv4 and IPv6, and the kernel no longer crashes in the described situation.(BZ#1372266)
* Previously, when the Enhanced Error Handling (EEH) mechanism did not block the PCI configuration space access and an error was detected, a kernel panic occurred. This update fixes EEH to fix this problem. As a result, the kernel no longer panics in the described scenario. (BZ#1379596)
* When the lockd service failed to start up completely, the notifier blocks were in some cases registered on a notification chain multiple times, which caused the occurrence of a circular list on the notification chain. Consequently, a soft lock-up or a kernel oops occurred. With this update, the notifier blocks are unregistered if lockd fails to start up completely, and the soft lock-ups or the kernel oopses no longer occur under the described circumstances. (BZ#1375637)
* When the Fibre Channel over Ethernet (FCoE) was configured, the FCoE MaxFrameSize parameter was incorrectly restricted to 1452. With this update, the NETIF_F_ALL_FCOE symbol
is no longer ignored, which fixes this bug. MaxFrameSize is now restricted to 2112, which is the correct value. (BZ#1381592)
* When the fnic driver was installed on Cisco UCS Blade Server, the discs were under certain circumstances put into the offline state with the following error message: "Medium access timeout failure. Offlining disk!". This update fixes fnic to set the Small Computer System Interface (SCSI) status as DID_ABORT after a successful abort operation. As a result, the discs are no longer put into the offlined state in the described situation. (BZ#1382620)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important)\n\n* It was reported that on s390x, the fork of a process with four page table levels will cause memory corruption with a variety of symptoms. All processes are created with three level page table and a limit of 4TB for the address space. If the parent process has four page table levels with a limit of 8PB, the function that duplicates the address space will try to copy memory areas outside of the address space limit for the child process. (CVE-2016-2143, Moderate)\n\nBug Fix(es):\n\n* Use of a multi-threaded workload with high memory mappings sometiems caused a kernel panic, due to a race condition between the context switch and the pagetable upgrade. This update fixes the switch_mm() by using the complete asce parameter instead of the asce_bits parameter. As a result, the kernel no longer panics in the described scenario. (BZ#1377472)\n\n* When iptables created the Transmission Control Protocol (TCP) reset packet, a kernel crash could occur due to uninitialized pointer to the TCP header within the Socket Buffer (SKB). This update fixes the transport header pointer in TCP reset for both IPv4 and IPv6, and the kernel no longer crashes in the described situation.(BZ#1372266)\n\n* Previously, when the Enhanced Error Handling (EEH) mechanism did not block the PCI configuration space access and an error was detected, a kernel panic occurred. This update fixes EEH to fix this problem. As a result, the kernel no longer panics in the described scenario. (BZ#1379596)\n\n* When the lockd service failed to start up completely, the notifier blocks were in some cases registered on a notification chain multiple times, which caused the occurrence of a circular list on the notification chain. Consequently, a soft lock-up or a kernel oops occurred. With this update, the notifier blocks are unregistered if lockd fails to start up completely, and the soft lock-ups or the kernel oopses no longer occur under the described circumstances. (BZ#1375637)\n\n* When the Fibre Channel over Ethernet (FCoE) was configured, the FCoE MaxFrameSize parameter was incorrectly restricted to 1452. With this update, the NETIF_F_ALL_FCOE symbol\nis no longer ignored, which fixes this bug. MaxFrameSize is now restricted to 2112, which is the correct value. (BZ#1381592)\n\n* When the fnic driver was installed on Cisco UCS Blade Server, the discs were under certain circumstances put into the offline state with the following error message: \"Medium access timeout failure. Offlining disk!\". This update fixes fnic to set the Small Computer System Interface (SCSI) status as DID_ABORT after a successful abort operation. As a result, the discs are no longer put into the offlined state in the described situation. (BZ#1382620)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2766", "url": "https://access.redhat.com/errata/RHSA-2016:2766" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1308908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1308908" }, { "category": "external", "summary": "1344721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2766.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T10:23:25+00:00", "generator": { "date": "2024-11-22T10:23:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:2766", "initial_release_date": "2016-11-15T19:36:52+00:00", "revision_history": [ { "date": "2016-11-15T19:36:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-11-15T19:36:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:23:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.11.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-642.11.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-642.11.1.el6.x86_64", "product_id": "kernel-0:2.6.32-642.11.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.11.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.11.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-642.11.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.11.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.11.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.11.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.11.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.11.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.11.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-642.11.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-642.11.1.el6.x86_64", "product_id": "perf-0:2.6.32-642.11.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-642.11.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-642.11.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-642.11.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-642.11.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-642.11.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.11.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-642.11.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.11.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.11.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.11.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.11.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-642.11.1.el6.i686", "product": { "name": "kernel-0:2.6.32-642.11.1.el6.i686", "product_id": "kernel-0:2.6.32-642.11.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.11.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-642.11.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-642.11.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.11.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-642.11.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-642.11.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.11.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-642.11.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-642.11.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.11.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-642.11.1.el6.i686", "product": { "name": "perf-0:2.6.32-642.11.1.el6.i686", "product_id": "perf-0:2.6.32-642.11.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-642.11.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-642.11.1.el6.i686", "product": { "name": "python-perf-0:2.6.32-642.11.1.el6.i686", "product_id": "python-perf-0:2.6.32-642.11.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-642.11.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-642.11.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-642.11.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-642.11.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-642.11.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-642.11.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-642.11.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-642.11.1.el6.src", "product": { "name": "kernel-0:2.6.32-642.11.1.el6.src", "product_id": "kernel-0:2.6.32-642.11.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.11.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.11.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-642.11.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-642.11.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.11.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.11.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-642.11.1.el6.s390x", "product": { "name": "python-perf-0:2.6.32-642.11.1.el6.s390x", "product_id": "python-perf-0:2.6.32-642.11.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-642.11.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.11.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-642.11.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-642.11.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-642.11.1.el6.s390x", "product_id": "kernel-0:2.6.32-642.11.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.11.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-642.11.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-642.11.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.11.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-642.11.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-642.11.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.11.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.11.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-642.11.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-642.11.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.11.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-642.11.1.el6.s390x", "product": { "name": "perf-0:2.6.32-642.11.1.el6.s390x", "product_id": "perf-0:2.6.32-642.11.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-642.11.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-642.11.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.11.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.11.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.11.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-642.11.1.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-642.11.1.el6.ppc64", "product_id": "python-perf-0:2.6.32-642.11.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-642.11.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.11.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-642.11.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-642.11.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-642.11.1.el6.ppc64", "product_id": "kernel-0:2.6.32-642.11.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.11.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-642.11.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.11.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.11.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.11.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.11.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-642.11.1.el6.ppc64", "product": { "name": "perf-0:2.6.32-642.11.1.el6.ppc64", "product_id": "perf-0:2.6.32-642.11.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-642.11.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.src" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.src", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.src", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.src" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.src", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.src" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.src", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.src", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.src" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.src", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.src", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-1583", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2016-06-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1344721" } ], "notes": [ { "category": "description", "text": "It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Stack overflow via ecryptfs and /proc/$pid/environ", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 5 and 6 and may addressed in a future update.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "RHBZ#1344721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1583", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1583" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1583", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1583" } ], "release_date": "2016-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-11-15T19:36:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2766" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Stack overflow via ecryptfs and /proc/$pid/environ" }, { "cve": "CVE-2016-2143", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2016-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1308908" } ], "notes": [ { "category": "description", "text": "It was reported that on s390x, the fork of a process with four page table levels will cause memory corruption with a variety of symptoms. All processes are created with three level page table and a limit of 4TB for the address space. If the parent process has four page table levels with a limit of 8PB, the function that duplicates the address space will try to copy memory areas outside of the address space limit for the child process.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Fork of large process causes memory corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2143" }, { "category": "external", "summary": "RHBZ#1308908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1308908" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2143", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2143" } ], "release_date": "2016-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-11-15T19:36:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2766" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.11.1.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.11.1.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.11.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Fork of large process causes memory corruption" } ] }
rhsa-2017:2760
Vulnerability from csaf_redhat
Published
2017-09-19 08:23
Modified
2024-11-22 10:23
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important)
Bug Fix(es):
* Previously, while the MAP_GROWSDOWN flag was set, writing to the memory which was mapped with the mmap system call failed with the SIGBUS signal. This update fixes memory management in the Linux kernel by backporting an upstream patch that enlarges the stack guard page gap. As a result, mmap now works as expected under the described circumstances. (BZ#1474721)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important)\n\nBug Fix(es):\n\n* Previously, while the MAP_GROWSDOWN flag was set, writing to the memory which was mapped with the mmap system call failed with the SIGBUS signal. This update fixes memory management in the Linux kernel by backporting an upstream patch that enlarges the stack guard page gap. As a result, mmap now works as expected under the described circumstances. (BZ#1474721)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:2760", "url": "https://access.redhat.com/errata/RHSA-2017:2760" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1344721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2760.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T10:23:36+00:00", "generator": { "date": "2024-11-22T10:23:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:2760", "initial_release_date": "2017-09-19T08:23:34+00:00", "revision_history": [ { "date": "2017-09-19T08:23:34+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-09-19T08:23:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:23:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.47.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-573.47.1.el6.x86_64", "product_id": "perf-0:2.6.32-573.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-573.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.47.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-573.47.1.el6.x86_64", "product_id": "kernel-0:2.6.32-573.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.47.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.47.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-573.47.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-573.47.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.47.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-573.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.47.1.el6.i686", "product": { "name": "python-perf-0:2.6.32-573.47.1.el6.i686", "product_id": "python-perf-0:2.6.32-573.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.47.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-573.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.47.1.el6.i686", "product": { "name": "perf-0:2.6.32-573.47.1.el6.i686", "product_id": "perf-0:2.6.32-573.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.47.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-573.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.47.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-573.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.47.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.47.1.el6.i686", "product": { "name": "kernel-0:2.6.32-573.47.1.el6.i686", "product_id": "kernel-0:2.6.32-573.47.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.47.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-573.47.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-573.47.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-573.47.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-573.47.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-573.47.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-573.47.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-573.47.1.el6.src", "product": { "name": "kernel-0:2.6.32-573.47.1.el6.src", "product_id": "kernel-0:2.6.32-573.47.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.47.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-573.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.47.1.el6.s390x", "product": { "name": "python-perf-0:2.6.32-573.47.1.el6.s390x", "product_id": "python-perf-0:2.6.32-573.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-573.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.47.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-573.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.47.1.el6.s390x", "product": { "name": "perf-0:2.6.32-573.47.1.el6.s390x", "product_id": "perf-0:2.6.32-573.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.47.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-573.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.47.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-573.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-573.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-573.47.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.47.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-573.47.1.el6.s390x", "product_id": "kernel-0:2.6.32-573.47.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.47.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.47.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.47.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.47.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.47.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.47.1.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-573.47.1.el6.ppc64", "product_id": "python-perf-0:2.6.32-573.47.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.47.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-573.47.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.47.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.47.1.el6.ppc64", "product": { "name": "perf-0:2.6.32-573.47.1.el6.ppc64", "product_id": "perf-0:2.6.32-573.47.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.47.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.47.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.47.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.47.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-573.47.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.47.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-573.47.1.el6.ppc64", "product_id": "kernel-0:2.6.32-573.47.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.47.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.src", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.47.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.47.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.47.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.47.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.47.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.47.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.47.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.47.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.47.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.47.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.src", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.47.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.47.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.47.1.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.47.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.47.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.src", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.47.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.47.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.47.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.47.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.47.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-1583", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2016-06-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1344721" } ], "notes": [ { "category": "description", "text": "It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Stack overflow via ecryptfs and /proc/$pid/environ", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 5 and 6 and may addressed in a future update.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.47.1.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.47.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "RHBZ#1344721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1583", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1583" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1583", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1583" } ], "release_date": "2016-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-09-19T08:23:34+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.47.1.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.47.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:2760" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.47.1.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.47.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.47.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.47.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.47.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.47.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Stack overflow via ecryptfs and /proc/$pid/environ" } ] }
suse-su-2016:1696-1
Vulnerability from csaf_suse
Published
2016-06-28 11:02
Modified
2016-06-28 11:02
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.59 to receive various security and bugfixes.
Main feature additions:
- Improved support for Clustered File System (CephFS, fate#318586).
- Addition of kGraft patches now produces logging messages to simplify auditing (fate#317827).
The following security bugs were fixed:
- CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143).
- CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547).
- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).
- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).
- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bsc#970948).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126 971793).
- CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors (bnc#970955).
- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).
- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911 970970).
- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).
- CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface (bnc#971628).
- CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor (bnc#974418).
- CVE-2016-4482: Fixed information leak in devio (bnc#978401).
- CVE-2016-4486: Fixed information leak in rtnetlink ( bsc#978822).
- CVE-2016-4569: Fixed information leak in events via snd_timer_user_tinterrupt (bsc#979213).
The following non-security bugs were fixed:
- ALSA: timer: Call notifier in the same spinlock (bsc#973378).
- ALSA: timer: Protect the whole snd_timer_close() with open race (bsc#973378).
- ALSA: timer: Sync timer deletion at closing the system timer (bsc#973378).
- ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378).
- Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685).
- Btrfs: do not return EBUSY on concurrent subvolume mounts (bsc#951844).
- Btrfs: fix deadlock between direct IO reads and buffered writes (bsc#973855).
- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685).
- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685).
- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685).
- Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685).
- Btrfs: fix loading of orphan roots leading to BUG_ON (bsc#972844).
- Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).
- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685).
- Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#972951).
- Btrfs: qgroup: return EINVAL if level of parent is not higher than child's (bsc#972951).
- Btrfs: teach backref walking about backrefs with underflowed offset values (bsc#975371).
- CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049).
- CacheFiles: Handle object being killed before being set up (bsc#971049).
- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).
- Drivers: hv: util: Pass the channel information during the init call (bnc#978527).
- Drivers: hv: utils: Invoke the poll function after handshake (bnc#978527).
- Drivers: hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read().
- Export helper function to set irq affinity in pci-hyperv.
- FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049).
- FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049).
- FS-Cache: Fix cancellation of in-progress operation (bsc#971049).
- FS-Cache: Handle a new operation submitted against a killed object (bsc#971049).
- FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049).
- FS-Cache: Out of line fscache_operation_init() (bsc#971049).
- FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049).
- FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049).
- FS-Cache: Reduce cookie ref count if submit fails (bsc#971049).
- FS-Cache: Synchronise object death state change vs operation submission (bsc#971049).
- FS-Cache: The operation cancellation method needs calling in more places (bsc#971049).
- FS-Cache: Timeout for releasepage() (bsc#971049).
- FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049).
- FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049).
- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- Fix kabi issue (bsc#971049).
- Input: i8042 - lower log level for 'no controller' message (bsc#945345).
- NFSv4.1: do not use machine credentials for CLOSE when using 'sec=sys' (bsc#972003).
- NVMe: Unify controller probe and resume (bsc#979347).
- NVMe: init nvme queue before enabling irq (bsc#662458).
- PCI/AER: Fix aer_inject error codes (bsc#931448).
- PCI/AER: Log actual error causes in aer_inject (bsc#931448).
- PCI/AER: Log aer_inject error injections (bsc#931448).
- PCI/AER: Use dev_warn() in aer_inject (bsc#931448).
- RDMA/ocrdma: Avoid reporting wrong completions in case of error CQEs (bsc#908151).
- Revert 'scsi: fix soft lockup in scsi_remove_target() on module removal' (bsc#970609).
- SUNRPC: Fix large reads on NFS/RDMA (bsc#908151).
- SUNRPC: remove KERN_INFO from dprintk() call sites (bsc#908151).
- USB: usbip: fix potential out-of-bounds write (bnc#975945).
- Use mainline variant of hyperv KVP IP failover patch (bnc#978527)
- acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).
- acpi: Disable APEI error injection if securelevel is set (bsc#972891).
- apparmor: Skip proc ns files (bsc#959514).
- cachefiles: perform test on s_blocksize when opening cache file (bsc#971049).
- ceph fscache: Introduce a routine for uncaching single no data page from fscache ().
- ceph fscache: Uncaching no data page from fscache in readpage().
- ceph: Add fs/ceph as a supported module.
- ceph: Asynchronous IO support.
- ceph: Avoid to propagate the invalid page point.
- ceph: Clean up if error occurred in finish_read().
- ceph: EIO all operations after forced umount.
- ceph: Implement writev/pwritev for sync operation.
- ceph: Remove racey watch/notify event infrastructure (bsc#964727)
- ceph: Remove racey watch/notify event infrastructure (bsc#964727)
- ceph: add acl for cephfs.
- ceph: add acl, noacl options for cephfs mount.
- ceph: add get_name() NFS export callback.
- ceph: add get_parent() NFS export callback.
- ceph: add imported caps when handling cap export message.
- ceph: add inline data to pagecache.
- ceph: add missing init_acl() for mkdir() and atomic_open().
- ceph: add open export target session helper.
- ceph: add request to i_unsafe_dirops when getting unsafe reply.
- ceph: additional debugfs output.
- ceph: always re-send cap flushes when MDS recovers.
- ceph: avoid block operation when !TASK_RUNNING (ceph_get_caps).
- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_close_sessions).
- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_sync).
- ceph: avoid releasing caps that are being used.
- ceph: avoid sending unnessesary FLUSHSNAP message.
- ceph: avoid useless ceph_get_dentry_parent_inode() in ceph_rename().
- ceph: cast PAGE_SIZE to size_t in ceph_sync_write().
- ceph: ceph_frag_contains_value can be boolean.
- ceph: ceph_get_parent() can be static.
- ceph: check OSD caps before read/write.
- ceph: check buffer size in ceph_vxattrcb_layout().
- ceph: check caps in filemap_fault and page_mkwrite.
- ceph: check directory's completeness before emitting directory entry.
- ceph: check inode caps in ceph_d_revalidate.
- ceph: check unsupported fallocate mode.
- ceph: check zero length in ceph_sync_read().
- ceph: checking for IS_ERR instead of NULL.
- ceph: cleanup unsafe requests when reconnecting is denied.
- ceph: cleanup use of ceph_msg_get.
- ceph: clear directory's completeness when creating file.
- ceph: convert inline data to normal data before data write.
- ceph: do not assume r_old_dentry[_dir] always set together.
- ceph: do not chain inode updates to parent fsync.
- ceph: do not grabs open file reference for aborted request.
- ceph: do not include ceph.{file,dir}.layout vxattr in listxattr().
- ceph: do not include used caps in cap_wanted.
- ceph: do not invalidate page cache when inode is no longer used.
- ceph: do not mark dirty caps when there is no auth cap.
- ceph: do not pre-allocate space for cap release messages.
- ceph: do not set r_old_dentry_dir on link().
- ceph: do not trim auth cap when there are cap snaps.
- ceph: do not zero i_wrbuffer_ref when reconnecting is denied.
- ceph: drop cap releases in requests composed before cap reconnect.
- ceph: drop extra open file reference in ceph_atomic_open().
- ceph: drop unconnected inodes.
- ceph: exclude setfilelock requests when calculating oldest tid.
- ceph: export ceph_session_state_name function.
- ceph: fetch inline data when getting Fcr cap refs.
- ceph: fix __dcache_readdir().
- ceph: fix a comment typo.
- ceph: fix append mode write.
- ceph: fix atomic_open snapdir.
- ceph: fix bool assignments.
- ceph: fix cache revoke race.
- ceph: fix ceph_dir_llseek().
- ceph: fix ceph_fh_to_parent().
- ceph: fix ceph_removexattr().
- ceph: fix ceph_set_acl().
- ceph: fix ceph_writepages_start().
- ceph: fix dcache/nocache mount option.
- ceph: fix dentry leaks.
- ceph: fix directory fsync.
- ceph: fix divide-by-zero in __validate_layout().
- ceph: fix double page_unlock() in page_mkwrite().
- ceph: fix dout() compile warnings in ceph_filemap_fault().
- ceph: fix file lock interruption.
- ceph: fix flush tid comparision.
- ceph: fix flushing caps.
- ceph: fix llistxattr on symlink.
- ceph: fix message length computation.
- ceph: fix mksnap crash.
- ceph: fix null pointer dereference in send_mds_reconnect().
- ceph: fix pr_fmt() redefinition.
- ceph: fix queuing inode to mdsdir's snaprealm.
- ceph: fix reading inline data when i_size > PAGE_SIZE.
- ceph: fix request time stamp encoding.
- ceph: fix reset_readdir().
- ceph: fix setting empty extended attribute.
- ceph: fix sizeof(struct tYpO *) typo.
- ceph: fix snap context leak in error path.
- ceph: fix trim caps.
- ceph: fix uninline data function.
- ceph: flush cap release queue when trimming session caps.
- ceph: flush inline version.
- ceph: forbid mandatory file lock.
- ceph: fscache: Update object store limit after file writing.
- ceph: fscache: Wait for completion of object initialization.
- ceph: fscache: add an interface to synchronize object store limit.
- ceph: get inode size for each append write.
- ceph: handle -ESTALE reply.
- ceph: handle SESSION_FORCE_RO message.
- ceph: handle cap export race in try_flush_caps().
- ceph: handle cap import atomically.
- ceph: handle frag mismatch between readdir request and reply.
- ceph: handle race between cap reconnect and cap release.
- ceph: handle session flush message.
- ceph: hold on to exclusive caps on complete directories.
- ceph: implement readv/preadv for sync operation.
- ceph: improve readahead for file holes.
- ceph: improve reference tracking for snaprealm.
- ceph: include time stamp in every MDS request.
- ceph: include time stamp in replayed MDS requests.
- ceph: initial CEPH_FEATURE_FS_FILE_LAYOUT_V2 support.
- ceph: initialize inode before instantiating dentry.
- ceph: introduce a new inode flag indicating if cached dentries are ordered.
- ceph: introduce ceph_fill_fragtree().
- ceph: introduce global empty snap context.
- ceph: invalidate dirty pages after forced umount.
- ceph: keep i_snap_realm while there are writers.
- ceph: kstrdup() memory handling.
- ceph: let MDS adjust readdir 'frag'.
- ceph: make ceph_forget_all_cached_acls() static inline.
- ceph: make fsync() wait unsafe requests that created/modified inode.
- ceph: make sure syncfs flushes all cap snaps.
- ceph: make sure write caps are registered with auth MDS.
- ceph: match wait_for_completion_timeout return type.
- ceph: message versioning fixes.
- ceph: move ceph_find_inode() outside the s_mutex.
- ceph: move spinlocking into ceph_encode_locks_to_buffer and ceph_count_locks.
- ceph: no need to get parent inode in ceph_open.
- ceph: parse inline data in MClientReply and MClientCaps.
- ceph: pre-allocate ceph_cap struct for ceph_add_cap().
- ceph: pre-allocate data structure that tracks caps flushing.
- ceph: preallocate buffer for readdir reply.
- ceph: print inode number for LOOKUPINO request.
- ceph: properly apply umask when ACL is enabled.
- ceph: properly handle XATTR_CREATE and XATTR_REPLACE.
- ceph: properly mark empty directory as complete.
- ceph: properly release page upon error.
- ceph: properly zero data pages for file holes.
- ceph: provide seperate {inode,file}_operations for snapdir.
- ceph: queue cap release in __ceph_remove_cap().
- ceph: queue vmtruncate if necessary when handing cap grant/revoke.
- ceph: ratelimit warn messages for MDS closes session.
- ceph: re-send AIO write request when getting -EOLDSNAP error.
- ceph: re-send flushing caps (which are revoked) in reconnect stage.
- ceph: re-send requests when MDS enters reconnecting stage.
- ceph: refactor readpage_nounlock() to make the logic clearer.
- ceph: remember subtree root dirfrag's auth MDS.
- ceph: remove exported caps when handling cap import message.
- ceph: remove outdated frag information.
- ceph: remove redundant code for max file size verification.
- ceph: remove redundant declaration.
- ceph: remove redundant memset(0).
- ceph: remove redundant test of head->safe and silence static analysis warnings.
- ceph: remove the useless judgement.
- ceph: remove unused functions in ceph_frag.h.
- ceph: remove unused stringification macros.
- ceph: remove useless ACL check.
- ceph: remove xattr when null value is given to setxattr().
- ceph: rename snapshot support.
- ceph: replace comma with a semicolon.
- ceph: request xattrs if xattr_version is zero.
- ceph: reserve caps for file layout/lock MDS requests.
- ceph: reset r_resend_mds after receiving -ESTALE.
- ceph: return error for traceless reply race.
- ceph: rework dcache readdir.
- ceph: send TID of the oldest pending caps flush to MDS.
- ceph: send client metadata to MDS.
- ceph: set caps count after composing cap reconnect message.
- ceph: set i_head_snapc when getting CEPH_CAP_FILE_WR reference.
- ceph: set mds_wanted when MDS reply changes a cap to auth cap.
- ceph: show nocephx_require_signatures and notcp_nodelay options.
- ceph: show non-default options only.
- ceph: simplify ceph_fh_to_dentry().
- ceph: simplify two mount_timeout sites.
- ceph: skip invalid dentry during dcache readdir.
- ceph: support inline data feature.
- ceph: switch some GFP_NOFS memory allocation to GFP_KERNEL.
- ceph: sync read inline data.
- ceph: take snap_rwsem when accessing snap realm's cached_context.
- ceph: track pending caps flushing accurately.
- ceph: track pending caps flushing globally.
- ceph: trim unused inodes before reconnecting to recovering MDS.
- ceph: trivial comment fix.
- ceph: update i_max_size even if inode version does not change.
- ceph: update inode fields according to issued caps.
- ceph: use %zu for len in ceph_fill_inline_data().
- ceph: use ceph_seq_cmp() to compare migrate_seq.
- ceph: use empty snap context for uninline_data and get_pool_perm.
- ceph: use fl->fl_file as owner identifier of flock and posix lock.
- ceph: use fl->fl_type to decide flock operation.
- ceph: use fpos_cmp() to compare dentry positions.
- ceph: use getattr request to fetch inline data.
- ceph: use i_size_{read,write} to get/set i_size.
- ceph: use msecs_to_jiffies for time conversion.
- ceph: use pagelist to present MDS request data.
- ceph: use truncate_pagecache() instead of truncate_inode_pages().
- ceph_sync_{,direct_}write: fix an oops on ceph_osdc_new_request() failure.
- client: include kernel version in client metadata.
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- crush: add chooseleaf_stable tunable.
- crush: decode and initialize chooseleaf_stable.
- crush: ensure bucket id is valid before indexing buckets array.
- crush: ensure take bucket value is valid.
- crush: fix crash from invalid 'take' argument.
- crush: sync up with userspace.
- crypto: testmgr - allow rfc3686 aes-ctr variants in fips mode (bsc#958390).
- crypto: testmgr - mark authenticated ctr(aes) also as FIPS able (bsc#958390).
- dasd: fix hanging system after LCU changes (bnc#968497, LTC#136671).
- drm/core: Preserve the framebuffer after removing it (bsc#968812).
- drm/i915: do not warn if backlight unexpectedly enabled (boo#972068).
- drm/i915: set backlight duty cycle after backlight enable for gen4 (boo#972780).
- drm/radeon: fix-up some float to fixed conversion thinkos (bsc#968813).
- drm/radeon: use HDP_MEM_COHERENCY_FLUSH_CNTL for sdma as well (bsc#968813).
- ext4: Fix softlockups in SEEK_HOLE and SEEK_DATA implementations (bsc#942262).
- ext4: fix races between page faults and hole punching (bsc#972174).
- ext4: fix races of writeback with punch hole and zero range (bsc#972174).
- fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687).
- fs, seqfile: always allow oom killer (bnc#968687).
- fs/ceph/debugfs.c: replace seq_printf by seq_puts.
- fs/ceph: replace pr_warning by pr_warn.
- fs/pipe.c: skip file_update_time on frozen fs (bsc#975488).
- ibmvscsi: Remove unsupported host config MAD (bsc#973556).
- iommu/vt-d: Improve fault handler error messages (bsc#975772).
- iommu/vt-d: Ratelimit fault handler (bsc#975772).
- ipv6: make fib6 serial number per namespace (bsc#965319).
- ipv6: per netns FIB garbage collection (bsc#965319).
- ipv6: per netns fib6 walkers (bsc#965319).
- ipv6: replace global gc_args with local variable (bsc#965319).
- kABI: kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().
- kABI: protect function file_open_root.
- kABI: protect include in evm.
- kABI: protect struct user_struct.
- kabi fix for patches.fixes/reduce-m_start-cost (bsc#966573).
- kabi/severities: Allow changes in zpci_* symbols (bsc#974692)
- kabi/severities: Whitelist libceph and rbd (bsc#964727).
- kabi: kgr, add reserved fields.
- kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846).
- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).
- kgr: add TAINT_KGRAFT.
- kgr: add kgraft annotation to hwrng kthread.
- kgr: add kgraft annotations to kthreads' wait_event_freezable() API calls.
- kgr: add objname to kgr_patch_fun struct.
- kgr: add sympos and objname to error and debug messages.
- kgr: add sympos as disambiguator field to kgr_patch_fun structure.
- kgr: add sympos to sysfs.
- kgr: call kgr_init_ftrace_ops() only for loaded objects.
- kgr: change to kallsyms_on_each_symbol iterator.
- kgr: define pr_fmt and modify all pr_* messages.
- kgr: do not print error for !abort_if_missing symbols (bnc#943989).
- kgr: do not return and print an error only if the object is not loaded.
- kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).
- kgr: fix an asymmetric dealing with delayed module loading.
- kgr: fix redirection on s390x arch (bsc#903279).
- kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().
- kgr: handle btrfs kthreads (bnc#889207).
- kgr: kmemleak, really mark the kthread safe after an interrupt.
- kgr: kmemleak, really mark the kthread safe after an interrupt.
- kgr: log when modifying kernel.
- kgr: mark kernel unsupported upon patch revert.
- kgr: mark some more missed kthreads (bnc#962336).
- kgr: remove abort_if_missing flag.
- kgr: usb/storage: do not emit thread awakened (bnc#899908).
- kgraft/gfs2: Do not block livepatching in the log daemon for too long.
- kgraft/xen: Do not block livepatching in the XEN blkif kthread.
- libceph: Avoid holding the zero page on ceph_msgr_slab_init errors.
- libceph: Fix ceph_tcp_sendpage()'s more boolean usage.
- libceph: MOSDOpReply v7 encoding.
- libceph: Remove spurious kunmap() of the zero page.
- libceph: a couple tweaks for wait loops.
- libceph: add nocephx_sign_messages option.
- libceph: advertise support for TUNABLES5.
- libceph: advertise support for keepalive2.
- libceph: allow setting osd_req_op's flags.
- libceph: check data_len in ->alloc_msg().
- libceph: clear messenger auth_retry flag if we fault.
- libceph: clear msg->con in ceph_msg_release() only.
- libceph: do not access invalid memory in keepalive2 path.
- libceph: do not spam dmesg with stray reply warnings.
- libceph: drop authorizer check from cephx msg signing routines.
- libceph: evaluate osd_req_op_data() arguments only once.
- libceph: fix authorizer invalidation, take 2.
- libceph: fix ceph_msg_revoke().
- libceph: fix wrong name 'Ceph filesystem for Linux'.
- libceph: introduce ceph_x_authorizer_cleanup().
- libceph: invalidate AUTH in addition to a service ticket.
- libceph: kill off ceph_x_ticket_handler::validity.
- libceph: move ceph_file_layout helpers to ceph_fs.h.
- libceph: msg signing callouts do not need con argument.
- libceph: nuke time_sub().
- libceph: properly release STAT request's raw_data_in.
- libceph: remove con argument in handle_reply().
- libceph: remove outdated comment.
- libceph: remove the unused macro AES_KEY_SIZE.
- libceph: rename con_work() to ceph_con_workfn().
- libceph: set 'exists' flag for newly up osd.
- libceph: stop duplicating client fields in messenger.
- libceph: store timeouts in jiffies, verify user input.
- libceph: treat sockaddr_storage with uninitialized family as blank.
- libceph: use keepalive2 to verify the mon session is alive.
- libceph: use list_for_each_entry_safe.
- libceph: use list_next_entry instead of list_entry_next.
- libceph: use local variable cursor instead of &msg->cursor.
- libceph: use the right footer size when skipping a message.
- libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846).
- mds: check cap ID when handling cap export message.
- mmc: Allow forward compatibility for eMMC (bnc#966054).
- mmc: sdhci: Allow for irq being shared (bnc#977582).
- mpt3sas: Fix use sas_is_tlr_enabled API before enabling MPI2_SCSIIO_CONTROL_TLR_ON flag (bsc#967640).
- nfs-rdma: Fix for FMR leaks (bsc#908151).
- nfs: fix high load average due to callback thread sleeping (bsc#971170).
- nvme: fix max_segments integer truncation (bsc#676471).
- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).
- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).
- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).
- pipe: limit the per-user amount of pages allocated in pipes (bsc#970948).
- powerpc/book3s64: Fix branching to OOL handlers in relocatable kernel (bsc@976821).
- powerpc/book3s64: Remove __end_handlers marker (bsc#976821).
- rbd: bump queue_max_segments.
- rbd: delete an unnecessary check before rbd_dev_destroy().
- rbd: do not free rbd_dev outside of the release callback.
- rbd: do not put snap_context twice in rbd_queue_workfn().
- rbd: drop null test before destroy functions.
- rbd: plug rbd_dev->header.object_prefix memory leak.
- rbd: rbd_wq comment is obsolete.
- rbd: remove duplicate calls to rbd_dev_mapping_clear().
- rbd: return -ENOMEM instead of pool id if rbd_dev_create() fails.
- rbd: set device_type::release instead of device::release.
- rbd: set max_sectors explicitly.
- rbd: store rbd_options in rbd_device.
- rbd: terminate rbd_opts_tokens with Opt_err.
- rbd: timeout watch teardown on unmap with mount_timeout.
- rbd: use GFP_NOIO consistently for request allocations (bsc#971159).
- rbd: use writefull op for object size writes.
- reduce m_start() cost.. (bsc#966573).
- s390/compat: correct restore of high gprs on signal return (bnc#968497, LTC#137571).
- s390/pageattr: do a single TLB flush for change_page_attr (bsc#940413).
- s390/pci: add extra padding to function measurement block (bnc#974692, LTC#139445).
- s390/pci: enforce fmb page boundary rule (bnc#974692, LTC#139445).
- s390/pci: extract software counters from fmb (bnc#974692, LTC#139445).
- s390/pci: remove pdev pointer from arch data (bnc#974692, LTC#139444).
- s390/pci_dma: fix DMA table corruption with > 4 TB main memory (bnc#974692, LTC#139401).
- s390/pci_dma: handle dma table failures (bnc#974692, LTC#139442).
- s390/pci_dma: improve debugging of errors during dma map (bnc#974692, LTC#139442).
- s390/pci_dma: unify label of invalid translation table entries (bnc#974692, LTC#139442).
- s390/zcrypt: HWRNG registration cause kernel panic on CEX hotplug (bnc#968497, LTC#138409).
- scsi-bnx2fc-handle_scsi_retry_delay
- scsi-bnx2fc-soft_lockup_when_rmmod
- scsi: Add intermediate STARGET_REMOVE state to scsi_target_state (bsc#970609).
- scsi: Avoid crashing if device uses DIX but adapter does not support it (bsc#969016).
- sd: get disk reference in sd_check_events() (bnc#897662).
- supported.conf: Add bridge.ko for OpenStack (bsc#971600)
- supported.conf: add pci-hyperv
- supported.conf:Add drivers/infiniband/hw/ocrdma/ocrdma.ko to supported.conf (bsc#964461)
- svcrdma: Fence LOCAL_INV work requests (bsc#908151).
- svcrdma: advertise the correct max payload (bsc#908151).
- svcrdma: fix offset calculation for non-page aligned sge entries (bsc#908151).
- svcrdma: fix printk when memory allocation fails (bsc#908151).
- svcrdma: refactor marshalling logic (bsc#908151).
- svcrdma: send_write() must not overflow the device's max sge (bsc#908151).
- target: Drop incorrect ABORT_TASK put for completed commands (bsc#962872).
- target: Fix LUN_RESET active I/O handling for ACK_KREF (bsc#962872).
- target: Fix LUN_RESET active TMR descriptor handling (bsc#962872).
- target: Fix TAS handling for multi-session se_node_acls (bsc#962872).
- target: Fix race with SCF_SEND_DELAYED_TAS handling (bsc#962872).
- target: Fix remote-port TMR ABORT + se_cmd fabric stop (bsc#962872).
- tcp: convert cached rtt from usec to jiffies when feeding initial rto (bsc#937086).
- vgaarb: Add more context to error messages (bsc#976868).
- xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).
- xprtrdma: Allocate missing pagelist (bsc#908151).
- xprtrdma: Avoid deadlock when credit window is reset (bsc#908151).
- xprtrdma: Disconnect on registration failure (bsc#908151).
- xprtrdma: Ensure ia->ri_id->qp is not NULL when reconnecting (bsc#908151).
- xprtrdma: Fall back to MTHCAFMR when FRMR is not supported (bsc#908151).
- xprtrdma: Limit work done by completion handler (bsc#908151).
- xprtrdma: Make rpcrdma_ep_destroy() return void (bsc#908151).
- xprtrdma: RPC/RDMA must invoke xprt_wake_pending_tasks() in process context (bsc#908151).
- xprtrdma: Reduce the number of hardway buffer allocations (bsc#908151).
- xprtrdma: Remove BOUNCEBUFFERS memory registration mode (bsc#908151).
- xprtrdma: Remove BUG_ON() call sites (bsc#908151).
- xprtrdma: Remove MEMWINDOWS registration modes (bsc#908151).
- xprtrdma: Remove REGISTER memory registration mode (bsc#908151).
- xprtrdma: Remove Tavor MTU setting (bsc#908151).
- xprtrdma: Reset connection timeout after successful reconnect (bsc#908151).
- xprtrdma: Simplify rpcrdma_deregister_external() synopsis (bsc#908151).
- xprtrdma: Split the completion queue (bsc#908151).
- xprtrdma: Use macros for reconnection timeout constants (bsc#908151).
- xprtrdma: mind the device's max fast register page list depth (bsc#908151).
- xprtrdma: mount reports 'Invalid mount option' if memreg mode not supported (bsc#908151).
- xprtrmda: Reduce calls to ib_poll_cq() in completion handlers (bsc#908151).
- xprtrmda: Reduce lock contention in completion handlers (bsc#908151).
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1004,SUSE-SLE-Live-Patching-12-2016-1004,SUSE-SLE-Module-Public-Cloud-12-2016-1004,SUSE-SLE-SDK-12-SP1-2016-1004,SUSE-SLE-SERVER-12-SP1-2016-1004,SUSE-SLE-WE-12-SP1-2016-1004
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.59 to receive various security and bugfixes.\n\nMain feature additions:\n- Improved support for Clustered File System (CephFS, fate#318586).\n- Addition of kGraft patches now produces logging messages to simplify auditing (fate#317827).\n\nThe following security bugs were fixed:\n- CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143).\n- CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547).\n- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).\n- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).\n- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).\n- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bsc#970948).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126 971793).\n- CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors (bnc#970955).\n- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).\n- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911 970970).\n- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).\n- CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface (bnc#971628).\n- CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor (bnc#974418).\n- CVE-2016-4482: Fixed information leak in devio (bnc#978401).\n- CVE-2016-4486: Fixed information leak in rtnetlink ( bsc#978822).\n- CVE-2016-4569: Fixed information leak in events via snd_timer_user_tinterrupt (bsc#979213).\n\nThe following non-security bugs were fixed:\n- ALSA: timer: Call notifier in the same spinlock (bsc#973378).\n- ALSA: timer: Protect the whole snd_timer_close() with open race (bsc#973378).\n- ALSA: timer: Sync timer deletion at closing the system timer (bsc#973378).\n- ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378).\n- Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685).\n- Btrfs: do not return EBUSY on concurrent subvolume mounts (bsc#951844).\n- Btrfs: fix deadlock between direct IO reads and buffered writes (bsc#973855).\n- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685).\n- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685).\n- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685).\n- Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685).\n- Btrfs: fix loading of orphan roots leading to BUG_ON (bsc#972844).\n- Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).\n- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685).\n- Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#972951).\n- Btrfs: qgroup: return EINVAL if level of parent is not higher than child\u0027s (bsc#972951).\n- Btrfs: teach backref walking about backrefs with underflowed offset values (bsc#975371).\n- CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049).\n- CacheFiles: Handle object being killed before being set up (bsc#971049).\n- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).\n- Drivers: hv: util: Pass the channel information during the init call (bnc#978527).\n- Drivers: hv: utils: Invoke the poll function after handshake (bnc#978527).\n- Drivers: hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read().\n- Export helper function to set irq affinity in pci-hyperv.\n- FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049).\n- FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049).\n- FS-Cache: Fix cancellation of in-progress operation (bsc#971049).\n- FS-Cache: Handle a new operation submitted against a killed object (bsc#971049).\n- FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049).\n- FS-Cache: Out of line fscache_operation_init() (bsc#971049).\n- FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049).\n- FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049).\n- FS-Cache: Reduce cookie ref count if submit fails (bsc#971049).\n- FS-Cache: Synchronise object death state change vs operation submission (bsc#971049).\n- FS-Cache: The operation cancellation method needs calling in more places (bsc#971049).\n- FS-Cache: Timeout for releasepage() (bsc#971049).\n- FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049).\n- FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049).\n- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)\n- Fix kabi issue (bsc#971049).\n- Input: i8042 - lower log level for \u0027no controller\u0027 message (bsc#945345).\n- NFSv4.1: do not use machine credentials for CLOSE when using \u0027sec=sys\u0027 (bsc#972003).\n- NVMe: Unify controller probe and resume (bsc#979347).\n- NVMe: init nvme queue before enabling irq (bsc#662458).\n- PCI/AER: Fix aer_inject error codes (bsc#931448).\n- PCI/AER: Log actual error causes in aer_inject (bsc#931448).\n- PCI/AER: Log aer_inject error injections (bsc#931448).\n- PCI/AER: Use dev_warn() in aer_inject (bsc#931448).\n- RDMA/ocrdma: Avoid reporting wrong completions in case of error CQEs (bsc#908151).\n- Revert \u0027scsi: fix soft lockup in scsi_remove_target() on module removal\u0027 (bsc#970609).\n- SUNRPC: Fix large reads on NFS/RDMA (bsc#908151).\n- SUNRPC: remove KERN_INFO from dprintk() call sites (bsc#908151).\n- USB: usbip: fix potential out-of-bounds write (bnc#975945).\n- Use mainline variant of hyperv KVP IP failover patch (bnc#978527)\n- acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).\n- acpi: Disable APEI error injection if securelevel is set (bsc#972891).\n- apparmor: Skip proc ns files (bsc#959514).\n- cachefiles: perform test on s_blocksize when opening cache file (bsc#971049).\n- ceph fscache: Introduce a routine for uncaching single no data page from fscache ().\n- ceph fscache: Uncaching no data page from fscache in readpage().\n- ceph: Add fs/ceph as a supported module.\n- ceph: Asynchronous IO support.\n- ceph: Avoid to propagate the invalid page point.\n- ceph: Clean up if error occurred in finish_read().\n- ceph: EIO all operations after forced umount.\n- ceph: Implement writev/pwritev for sync operation.\n- ceph: Remove racey watch/notify event infrastructure (bsc#964727)\n- ceph: Remove racey watch/notify event infrastructure (bsc#964727)\n- ceph: add acl for cephfs.\n- ceph: add acl, noacl options for cephfs mount.\n- ceph: add get_name() NFS export callback.\n- ceph: add get_parent() NFS export callback.\n- ceph: add imported caps when handling cap export message.\n- ceph: add inline data to pagecache.\n- ceph: add missing init_acl() for mkdir() and atomic_open().\n- ceph: add open export target session helper.\n- ceph: add request to i_unsafe_dirops when getting unsafe reply.\n- ceph: additional debugfs output.\n- ceph: always re-send cap flushes when MDS recovers.\n- ceph: avoid block operation when !TASK_RUNNING (ceph_get_caps).\n- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_close_sessions).\n- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_sync).\n- ceph: avoid releasing caps that are being used.\n- ceph: avoid sending unnessesary FLUSHSNAP message.\n- ceph: avoid useless ceph_get_dentry_parent_inode() in ceph_rename().\n- ceph: cast PAGE_SIZE to size_t in ceph_sync_write().\n- ceph: ceph_frag_contains_value can be boolean.\n- ceph: ceph_get_parent() can be static.\n- ceph: check OSD caps before read/write.\n- ceph: check buffer size in ceph_vxattrcb_layout().\n- ceph: check caps in filemap_fault and page_mkwrite.\n- ceph: check directory\u0027s completeness before emitting directory entry.\n- ceph: check inode caps in ceph_d_revalidate.\n- ceph: check unsupported fallocate mode.\n- ceph: check zero length in ceph_sync_read().\n- ceph: checking for IS_ERR instead of NULL.\n- ceph: cleanup unsafe requests when reconnecting is denied.\n- ceph: cleanup use of ceph_msg_get.\n- ceph: clear directory\u0027s completeness when creating file.\n- ceph: convert inline data to normal data before data write.\n- ceph: do not assume r_old_dentry[_dir] always set together.\n- ceph: do not chain inode updates to parent fsync.\n- ceph: do not grabs open file reference for aborted request.\n- ceph: do not include ceph.{file,dir}.layout vxattr in listxattr().\n- ceph: do not include used caps in cap_wanted.\n- ceph: do not invalidate page cache when inode is no longer used.\n- ceph: do not mark dirty caps when there is no auth cap.\n- ceph: do not pre-allocate space for cap release messages.\n- ceph: do not set r_old_dentry_dir on link().\n- ceph: do not trim auth cap when there are cap snaps.\n- ceph: do not zero i_wrbuffer_ref when reconnecting is denied.\n- ceph: drop cap releases in requests composed before cap reconnect.\n- ceph: drop extra open file reference in ceph_atomic_open().\n- ceph: drop unconnected inodes.\n- ceph: exclude setfilelock requests when calculating oldest tid.\n- ceph: export ceph_session_state_name function.\n- ceph: fetch inline data when getting Fcr cap refs.\n- ceph: fix __dcache_readdir().\n- ceph: fix a comment typo.\n- ceph: fix append mode write.\n- ceph: fix atomic_open snapdir.\n- ceph: fix bool assignments.\n- ceph: fix cache revoke race.\n- ceph: fix ceph_dir_llseek().\n- ceph: fix ceph_fh_to_parent().\n- ceph: fix ceph_removexattr().\n- ceph: fix ceph_set_acl().\n- ceph: fix ceph_writepages_start().\n- ceph: fix dcache/nocache mount option.\n- ceph: fix dentry leaks.\n- ceph: fix directory fsync.\n- ceph: fix divide-by-zero in __validate_layout().\n- ceph: fix double page_unlock() in page_mkwrite().\n- ceph: fix dout() compile warnings in ceph_filemap_fault().\n- ceph: fix file lock interruption.\n- ceph: fix flush tid comparision.\n- ceph: fix flushing caps.\n- ceph: fix llistxattr on symlink.\n- ceph: fix message length computation.\n- ceph: fix mksnap crash.\n- ceph: fix null pointer dereference in send_mds_reconnect().\n- ceph: fix pr_fmt() redefinition.\n- ceph: fix queuing inode to mdsdir\u0027s snaprealm.\n- ceph: fix reading inline data when i_size \u003e PAGE_SIZE.\n- ceph: fix request time stamp encoding.\n- ceph: fix reset_readdir().\n- ceph: fix setting empty extended attribute.\n- ceph: fix sizeof(struct tYpO *) typo.\n- ceph: fix snap context leak in error path.\n- ceph: fix trim caps.\n- ceph: fix uninline data function.\n- ceph: flush cap release queue when trimming session caps.\n- ceph: flush inline version.\n- ceph: forbid mandatory file lock.\n- ceph: fscache: Update object store limit after file writing.\n- ceph: fscache: Wait for completion of object initialization.\n- ceph: fscache: add an interface to synchronize object store limit.\n- ceph: get inode size for each append write.\n- ceph: handle -ESTALE reply.\n- ceph: handle SESSION_FORCE_RO message.\n- ceph: handle cap export race in try_flush_caps().\n- ceph: handle cap import atomically.\n- ceph: handle frag mismatch between readdir request and reply.\n- ceph: handle race between cap reconnect and cap release.\n- ceph: handle session flush message.\n- ceph: hold on to exclusive caps on complete directories.\n- ceph: implement readv/preadv for sync operation.\n- ceph: improve readahead for file holes.\n- ceph: improve reference tracking for snaprealm.\n- ceph: include time stamp in every MDS request.\n- ceph: include time stamp in replayed MDS requests.\n- ceph: initial CEPH_FEATURE_FS_FILE_LAYOUT_V2 support.\n- ceph: initialize inode before instantiating dentry.\n- ceph: introduce a new inode flag indicating if cached dentries are ordered.\n- ceph: introduce ceph_fill_fragtree().\n- ceph: introduce global empty snap context.\n- ceph: invalidate dirty pages after forced umount.\n- ceph: keep i_snap_realm while there are writers.\n- ceph: kstrdup() memory handling.\n- ceph: let MDS adjust readdir \u0027frag\u0027.\n- ceph: make ceph_forget_all_cached_acls() static inline.\n- ceph: make fsync() wait unsafe requests that created/modified inode.\n- ceph: make sure syncfs flushes all cap snaps.\n- ceph: make sure write caps are registered with auth MDS.\n- ceph: match wait_for_completion_timeout return type.\n- ceph: message versioning fixes.\n- ceph: move ceph_find_inode() outside the s_mutex.\n- ceph: move spinlocking into ceph_encode_locks_to_buffer and ceph_count_locks.\n- ceph: no need to get parent inode in ceph_open.\n- ceph: parse inline data in MClientReply and MClientCaps.\n- ceph: pre-allocate ceph_cap struct for ceph_add_cap().\n- ceph: pre-allocate data structure that tracks caps flushing.\n- ceph: preallocate buffer for readdir reply.\n- ceph: print inode number for LOOKUPINO request.\n- ceph: properly apply umask when ACL is enabled.\n- ceph: properly handle XATTR_CREATE and XATTR_REPLACE.\n- ceph: properly mark empty directory as complete.\n- ceph: properly release page upon error.\n- ceph: properly zero data pages for file holes.\n- ceph: provide seperate {inode,file}_operations for snapdir.\n- ceph: queue cap release in __ceph_remove_cap().\n- ceph: queue vmtruncate if necessary when handing cap grant/revoke.\n- ceph: ratelimit warn messages for MDS closes session.\n- ceph: re-send AIO write request when getting -EOLDSNAP error.\n- ceph: re-send flushing caps (which are revoked) in reconnect stage.\n- ceph: re-send requests when MDS enters reconnecting stage.\n- ceph: refactor readpage_nounlock() to make the logic clearer.\n- ceph: remember subtree root dirfrag\u0027s auth MDS.\n- ceph: remove exported caps when handling cap import message.\n- ceph: remove outdated frag information.\n- ceph: remove redundant code for max file size verification.\n- ceph: remove redundant declaration.\n- ceph: remove redundant memset(0).\n- ceph: remove redundant test of head-\u003esafe and silence static analysis warnings.\n- ceph: remove the useless judgement.\n- ceph: remove unused functions in ceph_frag.h.\n- ceph: remove unused stringification macros.\n- ceph: remove useless ACL check.\n- ceph: remove xattr when null value is given to setxattr().\n- ceph: rename snapshot support.\n- ceph: replace comma with a semicolon.\n- ceph: request xattrs if xattr_version is zero.\n- ceph: reserve caps for file layout/lock MDS requests.\n- ceph: reset r_resend_mds after receiving -ESTALE.\n- ceph: return error for traceless reply race.\n- ceph: rework dcache readdir.\n- ceph: send TID of the oldest pending caps flush to MDS.\n- ceph: send client metadata to MDS.\n- ceph: set caps count after composing cap reconnect message.\n- ceph: set i_head_snapc when getting CEPH_CAP_FILE_WR reference.\n- ceph: set mds_wanted when MDS reply changes a cap to auth cap.\n- ceph: show nocephx_require_signatures and notcp_nodelay options.\n- ceph: show non-default options only.\n- ceph: simplify ceph_fh_to_dentry().\n- ceph: simplify two mount_timeout sites.\n- ceph: skip invalid dentry during dcache readdir.\n- ceph: support inline data feature.\n- ceph: switch some GFP_NOFS memory allocation to GFP_KERNEL.\n- ceph: sync read inline data.\n- ceph: take snap_rwsem when accessing snap realm\u0027s cached_context.\n- ceph: track pending caps flushing accurately.\n- ceph: track pending caps flushing globally.\n- ceph: trim unused inodes before reconnecting to recovering MDS.\n- ceph: trivial comment fix.\n- ceph: update i_max_size even if inode version does not change.\n- ceph: update inode fields according to issued caps.\n- ceph: use %zu for len in ceph_fill_inline_data().\n- ceph: use ceph_seq_cmp() to compare migrate_seq.\n- ceph: use empty snap context for uninline_data and get_pool_perm.\n- ceph: use fl-\u003efl_file as owner identifier of flock and posix lock.\n- ceph: use fl-\u003efl_type to decide flock operation.\n- ceph: use fpos_cmp() to compare dentry positions.\n- ceph: use getattr request to fetch inline data.\n- ceph: use i_size_{read,write} to get/set i_size.\n- ceph: use msecs_to_jiffies for time conversion.\n- ceph: use pagelist to present MDS request data.\n- ceph: use truncate_pagecache() instead of truncate_inode_pages().\n- ceph_sync_{,direct_}write: fix an oops on ceph_osdc_new_request() failure.\n- client: include kernel version in client metadata.\n- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).\n- crush: add chooseleaf_stable tunable.\n- crush: decode and initialize chooseleaf_stable.\n- crush: ensure bucket id is valid before indexing buckets array.\n- crush: ensure take bucket value is valid.\n- crush: fix crash from invalid \u0027take\u0027 argument.\n- crush: sync up with userspace.\n- crypto: testmgr - allow rfc3686 aes-ctr variants in fips mode (bsc#958390).\n- crypto: testmgr - mark authenticated ctr(aes) also as FIPS able (bsc#958390).\n- dasd: fix hanging system after LCU changes (bnc#968497, LTC#136671).\n- drm/core: Preserve the framebuffer after removing it (bsc#968812).\n- drm/i915: do not warn if backlight unexpectedly enabled (boo#972068).\n- drm/i915: set backlight duty cycle after backlight enable for gen4 (boo#972780).\n- drm/radeon: fix-up some float to fixed conversion thinkos (bsc#968813).\n- drm/radeon: use HDP_MEM_COHERENCY_FLUSH_CNTL for sdma as well (bsc#968813).\n- ext4: Fix softlockups in SEEK_HOLE and SEEK_DATA implementations (bsc#942262).\n- ext4: fix races between page faults and hole punching (bsc#972174).\n- ext4: fix races of writeback with punch hole and zero range (bsc#972174).\n- fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687).\n- fs, seqfile: always allow oom killer (bnc#968687).\n- fs/ceph/debugfs.c: replace seq_printf by seq_puts.\n- fs/ceph: replace pr_warning by pr_warn.\n- fs/pipe.c: skip file_update_time on frozen fs (bsc#975488).\n- ibmvscsi: Remove unsupported host config MAD (bsc#973556).\n- iommu/vt-d: Improve fault handler error messages (bsc#975772).\n- iommu/vt-d: Ratelimit fault handler (bsc#975772).\n- ipv6: make fib6 serial number per namespace (bsc#965319).\n- ipv6: per netns FIB garbage collection (bsc#965319).\n- ipv6: per netns fib6 walkers (bsc#965319).\n- ipv6: replace global gc_args with local variable (bsc#965319).\n- kABI: kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().\n- kABI: protect function file_open_root.\n- kABI: protect include in evm.\n- kABI: protect struct user_struct.\n- kabi fix for patches.fixes/reduce-m_start-cost (bsc#966573).\n- kabi/severities: Allow changes in zpci_* symbols (bsc#974692)\n- kabi/severities: Whitelist libceph and rbd (bsc#964727).\n- kabi: kgr, add reserved fields.\n- kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846).\n- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).\n- kgr: add TAINT_KGRAFT.\n- kgr: add kgraft annotation to hwrng kthread.\n- kgr: add kgraft annotations to kthreads\u0027 wait_event_freezable() API calls.\n- kgr: add objname to kgr_patch_fun struct.\n- kgr: add sympos and objname to error and debug messages.\n- kgr: add sympos as disambiguator field to kgr_patch_fun structure.\n- kgr: add sympos to sysfs.\n- kgr: call kgr_init_ftrace_ops() only for loaded objects.\n- kgr: change to kallsyms_on_each_symbol iterator.\n- kgr: define pr_fmt and modify all pr_* messages.\n- kgr: do not print error for !abort_if_missing symbols (bnc#943989).\n- kgr: do not return and print an error only if the object is not loaded.\n- kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).\n- kgr: fix an asymmetric dealing with delayed module loading.\n- kgr: fix redirection on s390x arch (bsc#903279).\n- kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel().\n- kgr: handle btrfs kthreads (bnc#889207).\n- kgr: kmemleak, really mark the kthread safe after an interrupt.\n- kgr: kmemleak, really mark the kthread safe after an interrupt.\n- kgr: log when modifying kernel.\n- kgr: mark kernel unsupported upon patch revert.\n- kgr: mark some more missed kthreads (bnc#962336).\n- kgr: remove abort_if_missing flag.\n- kgr: usb/storage: do not emit thread awakened (bnc#899908).\n- kgraft/gfs2: Do not block livepatching in the log daemon for too long.\n- kgraft/xen: Do not block livepatching in the XEN blkif kthread.\n- libceph: Avoid holding the zero page on ceph_msgr_slab_init errors.\n- libceph: Fix ceph_tcp_sendpage()\u0027s more boolean usage.\n- libceph: MOSDOpReply v7 encoding.\n- libceph: Remove spurious kunmap() of the zero page.\n- libceph: a couple tweaks for wait loops.\n- libceph: add nocephx_sign_messages option.\n- libceph: advertise support for TUNABLES5.\n- libceph: advertise support for keepalive2.\n- libceph: allow setting osd_req_op\u0027s flags.\n- libceph: check data_len in -\u003ealloc_msg().\n- libceph: clear messenger auth_retry flag if we fault.\n- libceph: clear msg-\u003econ in ceph_msg_release() only.\n- libceph: do not access invalid memory in keepalive2 path.\n- libceph: do not spam dmesg with stray reply warnings.\n- libceph: drop authorizer check from cephx msg signing routines.\n- libceph: evaluate osd_req_op_data() arguments only once.\n- libceph: fix authorizer invalidation, take 2.\n- libceph: fix ceph_msg_revoke().\n- libceph: fix wrong name \u0027Ceph filesystem for Linux\u0027.\n- libceph: introduce ceph_x_authorizer_cleanup().\n- libceph: invalidate AUTH in addition to a service ticket.\n- libceph: kill off ceph_x_ticket_handler::validity.\n- libceph: move ceph_file_layout helpers to ceph_fs.h.\n- libceph: msg signing callouts do not need con argument.\n- libceph: nuke time_sub().\n- libceph: properly release STAT request\u0027s raw_data_in.\n- libceph: remove con argument in handle_reply().\n- libceph: remove outdated comment.\n- libceph: remove the unused macro AES_KEY_SIZE.\n- libceph: rename con_work() to ceph_con_workfn().\n- libceph: set \u0027exists\u0027 flag for newly up osd.\n- libceph: stop duplicating client fields in messenger.\n- libceph: store timeouts in jiffies, verify user input.\n- libceph: treat sockaddr_storage with uninitialized family as blank.\n- libceph: use keepalive2 to verify the mon session is alive.\n- libceph: use list_for_each_entry_safe.\n- libceph: use list_next_entry instead of list_entry_next.\n- libceph: use local variable cursor instead of \u0026msg-\u003ecursor.\n- libceph: use the right footer size when skipping a message.\n- libfc: replace \u0027rp_mutex\u0027 with \u0027rp_lock\u0027 (bsc#953233, bsc#962846).\n- mds: check cap ID when handling cap export message.\n- mmc: Allow forward compatibility for eMMC (bnc#966054).\n- mmc: sdhci: Allow for irq being shared (bnc#977582).\n- mpt3sas: Fix use sas_is_tlr_enabled API before enabling MPI2_SCSIIO_CONTROL_TLR_ON flag (bsc#967640).\n- nfs-rdma: Fix for FMR leaks (bsc#908151).\n- nfs: fix high load average due to callback thread sleeping (bsc#971170).\n- nvme: fix max_segments integer truncation (bsc#676471).\n- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).\n- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).\n- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).\n- pipe: limit the per-user amount of pages allocated in pipes (bsc#970948).\n- powerpc/book3s64: Fix branching to OOL handlers in relocatable kernel (bsc@976821).\n- powerpc/book3s64: Remove __end_handlers marker (bsc#976821).\n- rbd: bump queue_max_segments.\n- rbd: delete an unnecessary check before rbd_dev_destroy().\n- rbd: do not free rbd_dev outside of the release callback.\n- rbd: do not put snap_context twice in rbd_queue_workfn().\n- rbd: drop null test before destroy functions.\n- rbd: plug rbd_dev-\u003eheader.object_prefix memory leak.\n- rbd: rbd_wq comment is obsolete.\n- rbd: remove duplicate calls to rbd_dev_mapping_clear().\n- rbd: return -ENOMEM instead of pool id if rbd_dev_create() fails.\n- rbd: set device_type::release instead of device::release.\n- rbd: set max_sectors explicitly.\n- rbd: store rbd_options in rbd_device.\n- rbd: terminate rbd_opts_tokens with Opt_err.\n- rbd: timeout watch teardown on unmap with mount_timeout.\n- rbd: use GFP_NOIO consistently for request allocations (bsc#971159).\n- rbd: use writefull op for object size writes.\n- reduce m_start() cost.. (bsc#966573).\n- s390/compat: correct restore of high gprs on signal return (bnc#968497, LTC#137571).\n- s390/pageattr: do a single TLB flush for change_page_attr (bsc#940413).\n- s390/pci: add extra padding to function measurement block (bnc#974692, LTC#139445).\n- s390/pci: enforce fmb page boundary rule (bnc#974692, LTC#139445).\n- s390/pci: extract software counters from fmb (bnc#974692, LTC#139445).\n- s390/pci: remove pdev pointer from arch data (bnc#974692, LTC#139444).\n- s390/pci_dma: fix DMA table corruption with \u003e 4 TB main memory (bnc#974692, LTC#139401).\n- s390/pci_dma: handle dma table failures (bnc#974692, LTC#139442).\n- s390/pci_dma: improve debugging of errors during dma map (bnc#974692, LTC#139442).\n- s390/pci_dma: unify label of invalid translation table entries (bnc#974692, LTC#139442).\n- s390/zcrypt: HWRNG registration cause kernel panic on CEX hotplug (bnc#968497, LTC#138409).\n- scsi-bnx2fc-handle_scsi_retry_delay\n- scsi-bnx2fc-soft_lockup_when_rmmod\n- scsi: Add intermediate STARGET_REMOVE state to scsi_target_state (bsc#970609).\n- scsi: Avoid crashing if device uses DIX but adapter does not support it (bsc#969016).\n- sd: get disk reference in sd_check_events() (bnc#897662).\n- supported.conf: Add bridge.ko for OpenStack (bsc#971600)\n- supported.conf: add pci-hyperv\n- supported.conf:Add drivers/infiniband/hw/ocrdma/ocrdma.ko to supported.conf (bsc#964461)\n- svcrdma: Fence LOCAL_INV work requests (bsc#908151).\n- svcrdma: advertise the correct max payload (bsc#908151).\n- svcrdma: fix offset calculation for non-page aligned sge entries (bsc#908151).\n- svcrdma: fix printk when memory allocation fails (bsc#908151).\n- svcrdma: refactor marshalling logic (bsc#908151).\n- svcrdma: send_write() must not overflow the device\u0027s max sge (bsc#908151).\n- target: Drop incorrect ABORT_TASK put for completed commands (bsc#962872).\n- target: Fix LUN_RESET active I/O handling for ACK_KREF (bsc#962872).\n- target: Fix LUN_RESET active TMR descriptor handling (bsc#962872).\n- target: Fix TAS handling for multi-session se_node_acls (bsc#962872).\n- target: Fix race with SCF_SEND_DELAYED_TAS handling (bsc#962872).\n- target: Fix remote-port TMR ABORT + se_cmd fabric stop (bsc#962872).\n- tcp: convert cached rtt from usec to jiffies when feeding initial rto (bsc#937086).\n- vgaarb: Add more context to error messages (bsc#976868).\n- xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).\n- xprtrdma: Allocate missing pagelist (bsc#908151).\n- xprtrdma: Avoid deadlock when credit window is reset (bsc#908151).\n- xprtrdma: Disconnect on registration failure (bsc#908151).\n- xprtrdma: Ensure ia-\u003eri_id-\u003eqp is not NULL when reconnecting (bsc#908151).\n- xprtrdma: Fall back to MTHCAFMR when FRMR is not supported (bsc#908151).\n- xprtrdma: Limit work done by completion handler (bsc#908151).\n- xprtrdma: Make rpcrdma_ep_destroy() return void (bsc#908151).\n- xprtrdma: RPC/RDMA must invoke xprt_wake_pending_tasks() in process context (bsc#908151).\n- xprtrdma: Reduce the number of hardway buffer allocations (bsc#908151).\n- xprtrdma: Remove BOUNCEBUFFERS memory registration mode (bsc#908151).\n- xprtrdma: Remove BUG_ON() call sites (bsc#908151).\n- xprtrdma: Remove MEMWINDOWS registration modes (bsc#908151).\n- xprtrdma: Remove REGISTER memory registration mode (bsc#908151).\n- xprtrdma: Remove Tavor MTU setting (bsc#908151).\n- xprtrdma: Reset connection timeout after successful reconnect (bsc#908151).\n- xprtrdma: Simplify rpcrdma_deregister_external() synopsis (bsc#908151).\n- xprtrdma: Split the completion queue (bsc#908151).\n- xprtrdma: Use macros for reconnection timeout constants (bsc#908151).\n- xprtrdma: mind the device\u0027s max fast register page list depth (bsc#908151).\n- xprtrdma: mount reports \u0027Invalid mount option\u0027 if memreg mode not supported (bsc#908151).\n- xprtrmda: Reduce calls to ib_poll_cq() in completion handlers (bsc#908151).\n- xprtrmda: Reduce lock contention in completion handlers (bsc#908151).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2016-1004,SUSE-SLE-Live-Patching-12-2016-1004,SUSE-SLE-Module-Public-Cloud-12-2016-1004,SUSE-SLE-SDK-12-SP1-2016-1004,SUSE-SLE-SERVER-12-SP1-2016-1004,SUSE-SLE-WE-12-SP1-2016-1004", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1696-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1696-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161696-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1696-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-June/002139.html" }, { "category": "self", "summary": "SUSE Bug 662458", "url": "https://bugzilla.suse.com/662458" }, { "category": "self", "summary": "SUSE Bug 676471", "url": "https://bugzilla.suse.com/676471" }, { "category": "self", "summary": "SUSE Bug 889207", "url": "https://bugzilla.suse.com/889207" }, { "category": "self", "summary": "SUSE Bug 897662", "url": "https://bugzilla.suse.com/897662" }, { "category": "self", "summary": "SUSE Bug 899908", "url": "https://bugzilla.suse.com/899908" }, { "category": "self", "summary": "SUSE Bug 903279", "url": "https://bugzilla.suse.com/903279" }, { "category": "self", "summary": "SUSE Bug 908151", "url": "https://bugzilla.suse.com/908151" }, { "category": "self", "summary": "SUSE Bug 928547", "url": "https://bugzilla.suse.com/928547" }, { "category": "self", "summary": "SUSE Bug 931448", "url": "https://bugzilla.suse.com/931448" }, { "category": "self", "summary": "SUSE Bug 937086", "url": "https://bugzilla.suse.com/937086" }, { "category": "self", "summary": "SUSE Bug 940413", "url": "https://bugzilla.suse.com/940413" }, { "category": "self", "summary": "SUSE Bug 942262", "url": "https://bugzilla.suse.com/942262" }, { "category": "self", "summary": "SUSE Bug 943989", "url": "https://bugzilla.suse.com/943989" }, { "category": "self", "summary": "SUSE Bug 944309", "url": "https://bugzilla.suse.com/944309" }, { "category": "self", "summary": "SUSE Bug 945345", "url": "https://bugzilla.suse.com/945345" }, { "category": "self", "summary": "SUSE Bug 951844", "url": "https://bugzilla.suse.com/951844" }, { "category": "self", "summary": "SUSE Bug 953233", "url": "https://bugzilla.suse.com/953233" }, { "category": "self", "summary": "SUSE Bug 957805", "url": "https://bugzilla.suse.com/957805" }, { "category": "self", "summary": "SUSE Bug 958390", "url": "https://bugzilla.suse.com/958390" }, { "category": "self", "summary": "SUSE Bug 959514", "url": "https://bugzilla.suse.com/959514" }, { "category": "self", "summary": "SUSE Bug 960857", "url": "https://bugzilla.suse.com/960857" }, { "category": "self", "summary": "SUSE Bug 962336", "url": "https://bugzilla.suse.com/962336" }, { "category": "self", "summary": "SUSE Bug 962846", "url": "https://bugzilla.suse.com/962846" }, { "category": "self", "summary": "SUSE Bug 962872", "url": "https://bugzilla.suse.com/962872" }, { "category": "self", "summary": "SUSE Bug 963572", "url": "https://bugzilla.suse.com/963572" }, { "category": "self", "summary": "SUSE Bug 964461", "url": "https://bugzilla.suse.com/964461" }, { "category": "self", "summary": "SUSE Bug 964727", "url": "https://bugzilla.suse.com/964727" }, { "category": "self", "summary": "SUSE Bug 965319", "url": "https://bugzilla.suse.com/965319" }, { "category": "self", "summary": "SUSE Bug 966054", "url": "https://bugzilla.suse.com/966054" }, { "category": "self", "summary": "SUSE Bug 966573", "url": "https://bugzilla.suse.com/966573" }, { "category": "self", "summary": "SUSE Bug 967640", "url": "https://bugzilla.suse.com/967640" }, { "category": "self", "summary": "SUSE Bug 968497", "url": "https://bugzilla.suse.com/968497" }, { "category": "self", "summary": "SUSE Bug 968687", "url": "https://bugzilla.suse.com/968687" }, { "category": "self", "summary": "SUSE Bug 968812", "url": "https://bugzilla.suse.com/968812" }, { "category": "self", "summary": "SUSE Bug 968813", "url": "https://bugzilla.suse.com/968813" }, { "category": "self", "summary": "SUSE Bug 969016", "url": "https://bugzilla.suse.com/969016" }, { "category": "self", "summary": "SUSE Bug 970604", "url": "https://bugzilla.suse.com/970604" }, { "category": "self", "summary": "SUSE Bug 970609", "url": "https://bugzilla.suse.com/970609" }, { "category": "self", "summary": "SUSE Bug 970892", "url": "https://bugzilla.suse.com/970892" }, { "category": "self", "summary": "SUSE Bug 970911", "url": "https://bugzilla.suse.com/970911" }, { "category": "self", "summary": "SUSE Bug 970948", "url": "https://bugzilla.suse.com/970948" }, { "category": "self", "summary": "SUSE Bug 970955", "url": "https://bugzilla.suse.com/970955" }, { "category": "self", "summary": "SUSE Bug 970956", "url": "https://bugzilla.suse.com/970956" }, { "category": "self", "summary": "SUSE Bug 970958", "url": "https://bugzilla.suse.com/970958" }, { "category": "self", "summary": "SUSE Bug 970970", "url": "https://bugzilla.suse.com/970970" }, { "category": "self", "summary": "SUSE Bug 971049", "url": "https://bugzilla.suse.com/971049" }, { "category": "self", "summary": "SUSE Bug 971124", "url": "https://bugzilla.suse.com/971124" }, { "category": "self", "summary": "SUSE Bug 971126", "url": "https://bugzilla.suse.com/971126" }, { "category": "self", "summary": "SUSE Bug 971159", "url": "https://bugzilla.suse.com/971159" }, { "category": "self", "summary": "SUSE Bug 971170", "url": "https://bugzilla.suse.com/971170" }, { "category": "self", "summary": "SUSE Bug 971600", "url": "https://bugzilla.suse.com/971600" }, { "category": "self", "summary": "SUSE Bug 971628", "url": "https://bugzilla.suse.com/971628" }, { "category": "self", "summary": "SUSE Bug 971793", "url": "https://bugzilla.suse.com/971793" }, { "category": "self", "summary": "SUSE Bug 971947", "url": "https://bugzilla.suse.com/971947" }, { "category": "self", "summary": "SUSE Bug 972003", "url": "https://bugzilla.suse.com/972003" }, { "category": "self", "summary": "SUSE Bug 972068", "url": "https://bugzilla.suse.com/972068" }, { "category": "self", "summary": "SUSE Bug 972174", "url": "https://bugzilla.suse.com/972174" }, { "category": "self", "summary": "SUSE Bug 972780", "url": "https://bugzilla.suse.com/972780" }, { "category": "self", "summary": "SUSE Bug 972844", "url": "https://bugzilla.suse.com/972844" }, { "category": "self", "summary": "SUSE Bug 972891", "url": "https://bugzilla.suse.com/972891" }, { "category": "self", "summary": "SUSE Bug 972951", "url": "https://bugzilla.suse.com/972951" }, { "category": "self", "summary": "SUSE Bug 973378", "url": "https://bugzilla.suse.com/973378" }, { "category": "self", "summary": "SUSE Bug 973556", "url": "https://bugzilla.suse.com/973556" }, { "category": "self", "summary": "SUSE Bug 973855", "url": "https://bugzilla.suse.com/973855" }, { "category": "self", "summary": "SUSE Bug 974418", "url": "https://bugzilla.suse.com/974418" }, { "category": "self", "summary": "SUSE Bug 974646", "url": "https://bugzilla.suse.com/974646" }, { "category": "self", "summary": "SUSE Bug 974692", "url": "https://bugzilla.suse.com/974692" }, { "category": "self", "summary": "SUSE Bug 975371", "url": "https://bugzilla.suse.com/975371" }, { "category": "self", "summary": "SUSE Bug 975488", "url": "https://bugzilla.suse.com/975488" }, { "category": "self", "summary": "SUSE Bug 975772", "url": "https://bugzilla.suse.com/975772" }, { "category": "self", "summary": "SUSE Bug 975945", "url": "https://bugzilla.suse.com/975945" }, { "category": "self", "summary": "SUSE Bug 976739", "url": "https://bugzilla.suse.com/976739" }, { "category": "self", "summary": "SUSE Bug 976821", "url": "https://bugzilla.suse.com/976821" }, { "category": "self", "summary": "SUSE Bug 976868", "url": "https://bugzilla.suse.com/976868" }, { "category": "self", "summary": "SUSE Bug 977582", "url": "https://bugzilla.suse.com/977582" }, { "category": "self", "summary": "SUSE Bug 977685", "url": "https://bugzilla.suse.com/977685" }, { "category": "self", "summary": "SUSE Bug 978401", "url": "https://bugzilla.suse.com/978401" }, { "category": "self", "summary": "SUSE Bug 978527", "url": "https://bugzilla.suse.com/978527" }, { "category": "self", "summary": "SUSE Bug 978822", "url": "https://bugzilla.suse.com/978822" }, { "category": "self", "summary": "SUSE Bug 979213", "url": "https://bugzilla.suse.com/979213" }, { "category": "self", "summary": "SUSE Bug 979347", "url": "https://bugzilla.suse.com/979347" }, { "category": "self", "summary": "SUSE Bug 983143", "url": "https://bugzilla.suse.com/983143" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9717 page", "url": "https://www.suse.com/security/cve/CVE-2014-9717/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2185 page", "url": "https://www.suse.com/security/cve/CVE-2016-2185/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2186 page", "url": "https://www.suse.com/security/cve/CVE-2016-2186/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2188 page", "url": "https://www.suse.com/security/cve/CVE-2016-2188/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2847 page", "url": "https://www.suse.com/security/cve/CVE-2016-2847/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3136 page", "url": "https://www.suse.com/security/cve/CVE-2016-3136/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3137 page", "url": "https://www.suse.com/security/cve/CVE-2016-3137/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3138 page", "url": "https://www.suse.com/security/cve/CVE-2016-3138/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3140 page", "url": "https://www.suse.com/security/cve/CVE-2016-3140/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3689 page", "url": "https://www.suse.com/security/cve/CVE-2016-3689/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3951 page", "url": "https://www.suse.com/security/cve/CVE-2016-3951/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4482 page", "url": "https://www.suse.com/security/cve/CVE-2016-4482/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-06-28T11:02:10Z", "generator": { "date": "2016-06-28T11:02:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1696-1", "initial_release_date": "2016-06-28T11:02:10Z", "revision_history": [ { "date": "2016-06-28T11:02:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.59-60.41.2.noarch", "product": { "name": "kernel-devel-3.12.59-60.41.2.noarch", "product_id": "kernel-devel-3.12.59-60.41.2.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.59-60.41.2.noarch", "product": { "name": "kernel-macros-3.12.59-60.41.2.noarch", "product_id": "kernel-macros-3.12.59-60.41.2.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.59-60.41.2.noarch", "product": { "name": "kernel-source-3.12.59-60.41.2.noarch", "product_id": "kernel-source-3.12.59-60.41.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.59-60.41.8.noarch", "product": { "name": "kernel-docs-3.12.59-60.41.8.noarch", "product_id": "kernel-docs-3.12.59-60.41.8.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.59-60.41.2.ppc64le", "product": { "name": "kernel-obs-build-3.12.59-60.41.2.ppc64le", "product_id": "kernel-obs-build-3.12.59-60.41.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.59-60.41.2.ppc64le", "product": { "name": "kernel-default-3.12.59-60.41.2.ppc64le", "product_id": "kernel-default-3.12.59-60.41.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.59-60.41.2.ppc64le", "product": { "name": "kernel-default-base-3.12.59-60.41.2.ppc64le", "product_id": "kernel-default-base-3.12.59-60.41.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.59-60.41.2.ppc64le", "product": { "name": "kernel-default-devel-3.12.59-60.41.2.ppc64le", "product_id": "kernel-default-devel-3.12.59-60.41.2.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.59-60.41.1.ppc64le", "product": { "name": "kernel-syms-3.12.59-60.41.1.ppc64le", "product_id": "kernel-syms-3.12.59-60.41.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.59-60.41.2.s390x", "product": { "name": "kernel-obs-build-3.12.59-60.41.2.s390x", "product_id": "kernel-obs-build-3.12.59-60.41.2.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.59-60.41.2.s390x", "product": { "name": "kernel-default-3.12.59-60.41.2.s390x", "product_id": "kernel-default-3.12.59-60.41.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.59-60.41.2.s390x", "product": { "name": "kernel-default-base-3.12.59-60.41.2.s390x", "product_id": "kernel-default-base-3.12.59-60.41.2.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.59-60.41.2.s390x", "product": { "name": "kernel-default-devel-3.12.59-60.41.2.s390x", "product_id": "kernel-default-devel-3.12.59-60.41.2.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.59-60.41.2.s390x", "product": { "name": "kernel-default-man-3.12.59-60.41.2.s390x", "product_id": "kernel-default-man-3.12.59-60.41.2.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.59-60.41.1.s390x", "product": { "name": "kernel-syms-3.12.59-60.41.1.s390x", "product_id": "kernel-syms-3.12.59-60.41.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.59-60.41.2.x86_64", "product": { "name": "kernel-default-3.12.59-60.41.2.x86_64", "product_id": "kernel-default-3.12.59-60.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.59-60.41.2.x86_64", "product": { "name": "kernel-default-devel-3.12.59-60.41.2.x86_64", "product_id": "kernel-default-devel-3.12.59-60.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.59-60.41.2.x86_64", "product": { "name": "kernel-default-extra-3.12.59-60.41.2.x86_64", "product_id": "kernel-default-extra-3.12.59-60.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.59-60.41.1.x86_64", "product": { "name": "kernel-syms-3.12.59-60.41.1.x86_64", "product_id": "kernel-syms-3.12.59-60.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.59-60.41.2.x86_64", "product": { "name": "kernel-xen-3.12.59-60.41.2.x86_64", "product_id": "kernel-xen-3.12.59-60.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.59-60.41.2.x86_64", "product": { "name": "kernel-xen-devel-3.12.59-60.41.2.x86_64", "product_id": "kernel-xen-devel-3.12.59-60.41.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.59-60.41.2.x86_64", "product": { "name": "kernel-ec2-3.12.59-60.41.2.x86_64", "product_id": "kernel-ec2-3.12.59-60.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.59-60.41.2.x86_64", "product": { "name": "kernel-ec2-devel-3.12.59-60.41.2.x86_64", "product_id": "kernel-ec2-devel-3.12.59-60.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.59-60.41.2.x86_64", "product": { "name": "kernel-ec2-extra-3.12.59-60.41.2.x86_64", "product_id": "kernel-ec2-extra-3.12.59-60.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.59-60.41.2.x86_64", "product": { "name": "kernel-obs-build-3.12.59-60.41.2.x86_64", "product_id": "kernel-obs-build-3.12.59-60.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.59-60.41.2.x86_64", "product": { "name": "kernel-default-base-3.12.59-60.41.2.x86_64", "product_id": "kernel-default-base-3.12.59-60.41.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.59-60.41.2.x86_64", "product": { "name": "kernel-xen-base-3.12.59-60.41.2.x86_64", "product_id": "kernel-xen-base-3.12.59-60.41.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-default-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-default-extra-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch" }, "product_reference": "kernel-devel-3.12.59-60.41.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch" }, "product_reference": "kernel-macros-3.12.59-60.41.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch" }, "product_reference": "kernel-source-3.12.59-60.41.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.59-60.41.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64" }, "product_reference": "kernel-syms-3.12.59-60.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-xen-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-ec2-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.59-60.41.8.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch" }, "product_reference": "kernel-docs-3.12.59-60.41.8.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.59-60.41.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le" }, "product_reference": "kernel-obs-build-3.12.59-60.41.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x" }, "product_reference": "kernel-obs-build-3.12.59-60.41.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-obs-build-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.59-60.41.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le" }, "product_reference": "kernel-default-3.12.59-60.41.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x" }, "product_reference": "kernel-default-3.12.59-60.41.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-default-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.59-60.41.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le" }, "product_reference": "kernel-default-base-3.12.59-60.41.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x" }, "product_reference": "kernel-default-base-3.12.59-60.41.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-default-base-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.59-60.41.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le" }, "product_reference": "kernel-default-devel-3.12.59-60.41.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x" }, "product_reference": "kernel-default-devel-3.12.59-60.41.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x" }, "product_reference": "kernel-default-man-3.12.59-60.41.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch" }, "product_reference": "kernel-devel-3.12.59-60.41.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch" }, "product_reference": "kernel-macros-3.12.59-60.41.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch" }, "product_reference": "kernel-source-3.12.59-60.41.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.59-60.41.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le" }, "product_reference": "kernel-syms-3.12.59-60.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.59-60.41.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x" }, "product_reference": "kernel-syms-3.12.59-60.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.59-60.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64" }, "product_reference": "kernel-syms-3.12.59-60.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-xen-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-xen-base-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.59-60.41.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le" }, "product_reference": "kernel-default-3.12.59-60.41.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x" }, "product_reference": "kernel-default-3.12.59-60.41.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-default-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.59-60.41.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le" }, "product_reference": "kernel-default-base-3.12.59-60.41.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x" }, "product_reference": "kernel-default-base-3.12.59-60.41.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-default-base-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.59-60.41.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le" }, "product_reference": "kernel-default-devel-3.12.59-60.41.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x" }, "product_reference": "kernel-default-devel-3.12.59-60.41.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.59-60.41.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x" }, "product_reference": "kernel-default-man-3.12.59-60.41.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch" }, "product_reference": "kernel-devel-3.12.59-60.41.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch" }, "product_reference": "kernel-macros-3.12.59-60.41.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.59-60.41.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch" }, "product_reference": "kernel-source-3.12.59-60.41.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.59-60.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le" }, "product_reference": "kernel-syms-3.12.59-60.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.59-60.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x" }, "product_reference": "kernel-syms-3.12.59-60.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.59-60.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64" }, "product_reference": "kernel-syms-3.12.59-60.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-xen-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-xen-base-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.59-60.41.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" }, "product_reference": "kernel-default-extra-3.12.59-60.41.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9717", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9717" } ], "notes": [ { "category": "general", "text": "fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9717", "url": "https://www.suse.com/security/cve/CVE-2014-9717" }, { "category": "external", "summary": "SUSE Bug 928547 for CVE-2014-9717", "url": "https://bugzilla.suse.com/928547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T11:02:10Z", "details": "moderate" } ], "title": "CVE-2014-9717" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T11:02:10Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2185" } ], "notes": [ { "category": "general", "text": "The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2185", "url": "https://www.suse.com/security/cve/CVE-2016-2185" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2185", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971124 for CVE-2016-2185", "url": "https://bugzilla.suse.com/971124" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T11:02:10Z", "details": "low" } ], "title": "CVE-2016-2185" }, { "cve": "CVE-2016-2186", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2186" } ], "notes": [ { "category": "general", "text": "The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2186", "url": "https://www.suse.com/security/cve/CVE-2016-2186" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2186", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970958 for CVE-2016-2186", "url": "https://bugzilla.suse.com/970958" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T11:02:10Z", "details": "low" } ], "title": "CVE-2016-2186" }, { "cve": "CVE-2016-2188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2188" } ], "notes": [ { "category": "general", "text": "The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2188", "url": "https://www.suse.com/security/cve/CVE-2016-2188" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2188", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1067912 for CVE-2016-2188", "url": "https://bugzilla.suse.com/1067912" }, { "category": "external", "summary": "SUSE Bug 1132190 for CVE-2016-2188", "url": "https://bugzilla.suse.com/1132190" }, { "category": "external", "summary": "SUSE Bug 970956 for CVE-2016-2188", "url": "https://bugzilla.suse.com/970956" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T11:02:10Z", "details": "low" } ], "title": "CVE-2016-2188" }, { "cve": "CVE-2016-2847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2847" } ], "notes": [ { "category": "general", "text": "fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2847", "url": "https://www.suse.com/security/cve/CVE-2016-2847" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2847", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970948 for CVE-2016-2847", "url": "https://bugzilla.suse.com/970948" }, { "category": "external", "summary": "SUSE Bug 974646 for CVE-2016-2847", "url": "https://bugzilla.suse.com/974646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T11:02:10Z", "details": "low" } ], "title": "CVE-2016-2847" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T11:02:10Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-3136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3136" } ], "notes": [ { "category": "general", "text": "The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3136", "url": "https://www.suse.com/security/cve/CVE-2016-3136" }, { "category": "external", "summary": "SUSE Bug 970955 for CVE-2016-3136", "url": "https://bugzilla.suse.com/970955" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T11:02:10Z", "details": "moderate" } ], "title": "CVE-2016-3136" }, { "cve": "CVE-2016-3137", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3137" } ], "notes": [ { "category": "general", "text": "drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3137", "url": "https://www.suse.com/security/cve/CVE-2016-3137" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3137", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970970 for CVE-2016-3137", "url": "https://bugzilla.suse.com/970970" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T11:02:10Z", "details": "low" } ], "title": "CVE-2016-3137" }, { "cve": "CVE-2016-3138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3138" } ], "notes": [ { "category": "general", "text": "The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3138", "url": "https://www.suse.com/security/cve/CVE-2016-3138" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3138", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970911 for CVE-2016-3138", "url": "https://bugzilla.suse.com/970911" }, { "category": "external", "summary": "SUSE Bug 970970 for CVE-2016-3138", "url": "https://bugzilla.suse.com/970970" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T11:02:10Z", "details": "low" } ], "title": "CVE-2016-3138" }, { "cve": "CVE-2016-3140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3140" } ], "notes": [ { "category": "general", "text": "The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3140", "url": "https://www.suse.com/security/cve/CVE-2016-3140" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3140", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970892 for CVE-2016-3140", "url": "https://bugzilla.suse.com/970892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T11:02:10Z", "details": "low" } ], "title": "CVE-2016-3140" }, { "cve": "CVE-2016-3689", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3689" } ], "notes": [ { "category": "general", "text": "The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3689", "url": "https://www.suse.com/security/cve/CVE-2016-3689" }, { "category": "external", "summary": "SUSE Bug 971628 for CVE-2016-3689", "url": "https://bugzilla.suse.com/971628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T11:02:10Z", "details": "moderate" } ], "title": "CVE-2016-3689" }, { "cve": "CVE-2016-3951", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3951" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3951", "url": "https://www.suse.com/security/cve/CVE-2016-3951" }, { "category": "external", "summary": "SUSE Bug 974418 for CVE-2016-3951", "url": "https://bugzilla.suse.com/974418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T11:02:10Z", "details": "moderate" } ], "title": "CVE-2016-3951" }, { "cve": "CVE-2016-4482", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4482" } ], "notes": [ { "category": "general", "text": "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4482", "url": "https://www.suse.com/security/cve/CVE-2016-4482" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4482", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978401 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978401" }, { "category": "external", "summary": "SUSE Bug 978445 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T11:02:10Z", "details": "low" } ], "title": "CVE-2016-4482" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T11:02:10Z", "details": "low" } ], "title": "CVE-2016-4486" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-1-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-1-2.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.41.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.41.8.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.41.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.41.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-28T11:02:10Z", "details": "low" } ], "title": "CVE-2016-4569" } ] }
suse-su-2016:2014-1
Vulnerability from csaf_suse
Published
2016-08-09 11:24
Modified
2016-08-09 11:24
Summary
Security update for Linux Kernel Live Patch 7 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 7 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.44-52_18 fixes several issues.
The following security bugs were fixed:
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bsc#973570, bsc#955837).
Patchnames
SUSE-SLE-SAP-12-2016-1177,SUSE-SLE-SERVER-12-2016-1177
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 7 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.44-52_18 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).\n- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).\n- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bsc#973570, bsc#955837).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1177,SUSE-SLE-SERVER-12-2016-1177", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2014-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2014-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162014-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2014-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002200.html" }, { "category": "self", "summary": "SUSE Bug 955837", "url": "https://bugzilla.suse.com/955837" }, { "category": "self", "summary": "SUSE Bug 971793", "url": "https://bugzilla.suse.com/971793" }, { "category": "self", "summary": "SUSE Bug 973570", "url": "https://bugzilla.suse.com/973570" }, { "category": "self", "summary": "SUSE Bug 979064", "url": "https://bugzilla.suse.com/979064" }, { "category": "self", "summary": "SUSE Bug 979074", "url": "https://bugzilla.suse.com/979074" }, { "category": "self", "summary": "SUSE Bug 980856", "url": "https://bugzilla.suse.com/980856" }, { "category": "self", "summary": "SUSE Bug 980883", "url": "https://bugzilla.suse.com/980883" }, { "category": "self", "summary": "SUSE Bug 983144", "url": "https://bugzilla.suse.com/983144" }, { "category": "self", "summary": "SUSE Bug 984764", "url": "https://bugzilla.suse.com/984764" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7446 page", "url": "https://www.suse.com/security/cve/CVE-2013-7446/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8816 page", "url": "https://www.suse.com/security/cve/CVE-2015-8816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" } ], "title": "Security update for Linux Kernel Live Patch 7 for SLE 12", "tracking": { "current_release_date": "2016-08-09T11:24:33Z", "generator": { "date": "2016-08-09T11:24:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2014-1", "initial_release_date": "2016-08-09T11:24:33Z", "revision_history": [ { "date": "2016-08-09T11:24:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "product_id": "kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "product_id": "kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7446" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7446", "url": "https://www.suse.com/security/cve/CVE-2013-7446" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-7446", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 955654 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955654" }, { "category": "external", "summary": "SUSE Bug 955837 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:33Z", "details": "moderate" } ], "title": "CVE-2013-7446" }, { "cve": "CVE-2015-8816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8816" } ], "notes": [ { "category": "general", "text": "The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8816", "url": "https://www.suse.com/security/cve/CVE-2015-8816" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8816", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968010 for CVE-2015-8816", "url": "https://bugzilla.suse.com/968010" }, { "category": "external", "summary": "SUSE Bug 979064 for CVE-2015-8816", "url": "https://bugzilla.suse.com/979064" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:33Z", "details": "low" } ], "title": "CVE-2015-8816" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:33Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:33Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:33Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:33Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:33Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_44-52_18-xen-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:33Z", "details": "moderate" } ], "title": "CVE-2016-4565" } ] }
suse-su-2016:2006-1
Vulnerability from csaf_suse
Published
2016-08-09 11:23
Modified
2016-08-09 11:23
Summary
Security update for Linux Kernel Live Patch 12 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 12 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.55-52_42 fixes several issues.
The following security bugs were fixed:
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bsc#973570, bsc#955837).
Patchnames
SUSE-SLE-SAP-12-2016-1173,SUSE-SLE-SERVER-12-2016-1173
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 12 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.55-52_42 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).\n- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).\n- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bsc#973570, bsc#955837).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1173,SUSE-SLE-SERVER-12-2016-1173", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2006-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2006-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162006-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2006-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002192.html" }, { "category": "self", "summary": "SUSE Bug 955837", "url": "https://bugzilla.suse.com/955837" }, { "category": "self", "summary": "SUSE Bug 971793", "url": "https://bugzilla.suse.com/971793" }, { "category": "self", "summary": "SUSE Bug 973570", "url": "https://bugzilla.suse.com/973570" }, { "category": "self", "summary": "SUSE Bug 979064", "url": "https://bugzilla.suse.com/979064" }, { "category": "self", "summary": "SUSE Bug 979074", "url": "https://bugzilla.suse.com/979074" }, { "category": "self", "summary": "SUSE Bug 980856", "url": "https://bugzilla.suse.com/980856" }, { "category": "self", "summary": "SUSE Bug 980883", "url": "https://bugzilla.suse.com/980883" }, { "category": "self", "summary": "SUSE Bug 983144", "url": "https://bugzilla.suse.com/983144" }, { "category": "self", "summary": "SUSE Bug 984764", "url": "https://bugzilla.suse.com/984764" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7446 page", "url": "https://www.suse.com/security/cve/CVE-2013-7446/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8816 page", "url": "https://www.suse.com/security/cve/CVE-2015-8816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" } ], "title": "Security update for Linux Kernel Live Patch 12 for SLE 12", "tracking": { "current_release_date": "2016-08-09T11:23:24Z", "generator": { "date": "2016-08-09T11:23:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2006-1", "initial_release_date": "2016-08-09T11:23:24Z", "revision_history": [ { "date": "2016-08-09T11:23:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "product_id": "kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "product_id": "kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7446" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7446", "url": "https://www.suse.com/security/cve/CVE-2013-7446" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-7446", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 955654 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955654" }, { "category": "external", "summary": "SUSE Bug 955837 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:24Z", "details": "moderate" } ], "title": "CVE-2013-7446" }, { "cve": "CVE-2015-8816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8816" } ], "notes": [ { "category": "general", "text": "The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8816", "url": "https://www.suse.com/security/cve/CVE-2015-8816" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8816", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968010 for CVE-2015-8816", "url": "https://bugzilla.suse.com/968010" }, { "category": "external", "summary": "SUSE Bug 979064 for CVE-2015-8816", "url": "https://bugzilla.suse.com/979064" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:24Z", "details": "low" } ], "title": "CVE-2015-8816" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:24Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:24Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:24Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:24Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:24Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:24Z", "details": "moderate" } ], "title": "CVE-2016-4565" } ] }
suse-su-2016:2005-1
Vulnerability from csaf_suse
Published
2016-08-09 11:24
Modified
2016-08-09 11:24
Summary
Security update for Linux Kernel Live Patch 8 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 8 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.48-52_27 fixes several issues.
The following security bugs were fixed:
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).
- CVE-2015-8019: The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel did not accept a length argument, which allowed local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call (bsc#979078).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bsc#973570, bsc#955837).
Patchnames
SUSE-SLE-SAP-12-2016-1176,SUSE-SLE-SERVER-12-2016-1176
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 8 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.48-52_27 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).\n- CVE-2015-8019: The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel did not accept a length argument, which allowed local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call (bsc#979078).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).\n- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).\n- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bsc#973570, bsc#955837).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1176,SUSE-SLE-SERVER-12-2016-1176", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2005-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2005-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162005-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2005-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002191.html" }, { "category": "self", "summary": "SUSE Bug 955837", "url": "https://bugzilla.suse.com/955837" }, { "category": "self", "summary": "SUSE Bug 971793", "url": "https://bugzilla.suse.com/971793" }, { "category": "self", "summary": "SUSE Bug 973570", "url": "https://bugzilla.suse.com/973570" }, { "category": "self", "summary": "SUSE Bug 979064", "url": "https://bugzilla.suse.com/979064" }, { "category": "self", "summary": "SUSE Bug 979074", "url": "https://bugzilla.suse.com/979074" }, { "category": "self", "summary": "SUSE Bug 979078", "url": "https://bugzilla.suse.com/979078" }, { "category": "self", "summary": "SUSE Bug 980856", "url": "https://bugzilla.suse.com/980856" }, { "category": "self", "summary": "SUSE Bug 980883", "url": "https://bugzilla.suse.com/980883" }, { "category": "self", "summary": "SUSE Bug 983144", "url": "https://bugzilla.suse.com/983144" }, { "category": "self", "summary": "SUSE Bug 984764", "url": "https://bugzilla.suse.com/984764" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7446 page", "url": "https://www.suse.com/security/cve/CVE-2013-7446/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8019 page", "url": "https://www.suse.com/security/cve/CVE-2015-8019/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8816 page", "url": "https://www.suse.com/security/cve/CVE-2015-8816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" } ], "title": "Security update for Linux Kernel Live Patch 8 for SLE 12", "tracking": { "current_release_date": "2016-08-09T11:24:17Z", "generator": { "date": "2016-08-09T11:24:17Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2005-1", "initial_release_date": "2016-08-09T11:24:17Z", "revision_history": [ { "date": "2016-08-09T11:24:17Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "product_id": "kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "product_id": "kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7446" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7446", "url": "https://www.suse.com/security/cve/CVE-2013-7446" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-7446", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 955654 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955654" }, { "category": "external", "summary": "SUSE Bug 955837 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:17Z", "details": "moderate" } ], "title": "CVE-2013-7446" }, { "cve": "CVE-2015-8019", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8019" } ], "notes": [ { "category": "general", "text": "The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel 3.14.54 and 3.18.22 does not accept a length argument, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8019", "url": "https://www.suse.com/security/cve/CVE-2015-8019" }, { "category": "external", "summary": "SUSE Bug 1032268 for CVE-2015-8019", "url": "https://bugzilla.suse.com/1032268" }, { "category": "external", "summary": "SUSE Bug 951199 for CVE-2015-8019", "url": "https://bugzilla.suse.com/951199" }, { "category": "external", "summary": "SUSE Bug 952587 for CVE-2015-8019", "url": "https://bugzilla.suse.com/952587" }, { "category": "external", "summary": "SUSE Bug 979078 for CVE-2015-8019", "url": "https://bugzilla.suse.com/979078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:17Z", "details": "moderate" } ], "title": "CVE-2015-8019" }, { "cve": "CVE-2015-8816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8816" } ], "notes": [ { "category": "general", "text": "The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8816", "url": "https://www.suse.com/security/cve/CVE-2015-8816" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8816", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968010 for CVE-2015-8816", "url": "https://bugzilla.suse.com/968010" }, { "category": "external", "summary": "SUSE Bug 979064 for CVE-2015-8816", "url": "https://bugzilla.suse.com/979064" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:17Z", "details": "low" } ], "title": "CVE-2015-8816" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:17Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:17Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:17Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:17Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:17Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_48-52_27-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:17Z", "details": "moderate" } ], "title": "CVE-2016-4565" } ] }
suse-su-2016:1961-1
Vulnerability from csaf_suse
Published
2016-08-04 14:55
Modified
2016-08-04 14:55
Summary
Security update for Linux Kernel Live Patch 0 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 0 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.49-11.1 fixes the several issues.
These security issues were fixed:
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).
- CVE-2015-8019: The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel did not accept a length argument, which allowed local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call (bsc#979078).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).
This non-security issue was fixed:
- bsc#973570: The fix for CVE-2013-7446 introduced a bug that could have possibly lead to a softlockup.
Patchnames
SUSE-SLE-Live-Patching-12-2016-1157
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 0 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.49-11.1 fixes the several issues.\n\nThese security issues were fixed:\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).\n- CVE-2015-8019: The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel did not accept a length argument, which allowed local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call (bsc#979078).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).\n- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).\n\nThis non-security issue was fixed:\n- bsc#973570: The fix for CVE-2013-7446 introduced a bug that could have possibly lead to a softlockup. \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1157", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1961-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1961-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161961-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1961-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002177.html" }, { "category": "self", "summary": "SUSE Bug 971793", "url": "https://bugzilla.suse.com/971793" }, { "category": "self", "summary": "SUSE Bug 973570", "url": "https://bugzilla.suse.com/973570" }, { "category": "self", "summary": "SUSE Bug 979064", "url": "https://bugzilla.suse.com/979064" }, { "category": "self", "summary": "SUSE Bug 979074", "url": "https://bugzilla.suse.com/979074" }, { "category": "self", "summary": "SUSE Bug 979078", "url": "https://bugzilla.suse.com/979078" }, { "category": "self", "summary": "SUSE Bug 980856", "url": "https://bugzilla.suse.com/980856" }, { "category": "self", "summary": "SUSE Bug 980883", "url": "https://bugzilla.suse.com/980883" }, { "category": "self", "summary": "SUSE Bug 983144", "url": "https://bugzilla.suse.com/983144" }, { "category": "self", "summary": "SUSE Bug 984764", "url": "https://bugzilla.suse.com/984764" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7446 page", "url": "https://www.suse.com/security/cve/CVE-2013-7446/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8019 page", "url": "https://www.suse.com/security/cve/CVE-2015-8019/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8816 page", "url": "https://www.suse.com/security/cve/CVE-2015-8816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" } ], "title": "Security update for Linux Kernel Live Patch 0 for SLE 12 SP1", "tracking": { "current_release_date": "2016-08-04T14:55:08Z", "generator": { "date": "2016-08-04T14:55:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1961-1", "initial_release_date": "2016-08-04T14:55:08Z", "revision_history": [ { "date": "2016-08-04T14:55:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "product": { "name": "kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "product_id": "kgraft-patch-3_12_49-11-default-5-14.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_49-11-xen-5-14.2.x86_64", "product": { "name": "kgraft-patch-3_12_49-11-xen-5-14.2.x86_64", "product_id": "kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_49-11-default-5-14.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64" }, "product_reference": "kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_49-11-xen-5-14.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" }, "product_reference": "kgraft-patch-3_12_49-11-xen-5-14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7446" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7446", "url": "https://www.suse.com/security/cve/CVE-2013-7446" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-7446", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 955654 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955654" }, { "category": "external", "summary": "SUSE Bug 955837 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-04T14:55:08Z", "details": "moderate" } ], "title": "CVE-2013-7446" }, { "cve": "CVE-2015-8019", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8019" } ], "notes": [ { "category": "general", "text": "The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel 3.14.54 and 3.18.22 does not accept a length argument, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8019", "url": "https://www.suse.com/security/cve/CVE-2015-8019" }, { "category": "external", "summary": "SUSE Bug 1032268 for CVE-2015-8019", "url": "https://bugzilla.suse.com/1032268" }, { "category": "external", "summary": "SUSE Bug 951199 for CVE-2015-8019", "url": "https://bugzilla.suse.com/951199" }, { "category": "external", "summary": "SUSE Bug 952587 for CVE-2015-8019", "url": "https://bugzilla.suse.com/952587" }, { "category": "external", "summary": "SUSE Bug 979078 for CVE-2015-8019", "url": "https://bugzilla.suse.com/979078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-04T14:55:08Z", "details": "moderate" } ], "title": "CVE-2015-8019" }, { "cve": "CVE-2015-8816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8816" } ], "notes": [ { "category": "general", "text": "The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8816", "url": "https://www.suse.com/security/cve/CVE-2015-8816" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8816", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968010 for CVE-2015-8816", "url": "https://bugzilla.suse.com/968010" }, { "category": "external", "summary": "SUSE Bug 979064 for CVE-2015-8816", "url": "https://bugzilla.suse.com/979064" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-04T14:55:08Z", "details": "low" } ], "title": "CVE-2015-8816" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-04T14:55:08Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-04T14:55:08Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-04T14:55:08Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-04T14:55:08Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-04T14:55:08Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-5-14.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-5-14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-04T14:55:08Z", "details": "moderate" } ], "title": "CVE-2016-4565" } ] }
suse-su-2016:1937-1
Vulnerability from csaf_suse
Published
2016-08-02 11:06
Modified
2016-08-02 11:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.61 to receive various security and bugfixes.
Main feature additions:
- Improved support for Clustered File System (CephFS, fate#318586).
The following security bugs were fixed:
- CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547).
- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).
- CVE-2015-8551: The PCI backend driver in Xen, when running on an x86 system, allowed local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka 'Linux pciback missing sanity checks (bnc#957990).
- CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system, allowed local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka 'Linux pciback missing sanity checks (bnc#957990).
- CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).
- CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308).
- CVE-2016-3707: The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel allowed remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file (bnc#980246).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
The following non-security bugs were fixed:
- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).
- Add wait_event_cmd() (bsc#953048).
- Btrfs: be more precise on errors when getting an inode from disk (bsc#981038).
- Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685).
- Btrfs: do not return EBUSY on concurrent subvolume mounts (bsc#951844).
- Btrfs: do not use src fd for printk (bsc#980348).
- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685).
- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685).
- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685).
- Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685).
- Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).
- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685).
- Btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).
- Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933).
- Btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844).
- CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049).
- CacheFiles: Handle object being killed before being set up (bsc#971049).
- EDAC, sb_edac: Add support for duplicate device IDs (bsc#979521).
- EDAC, sb_edac: Fix TAD presence check for sbridge_mci_bind_devs() (bsc#979521).
- EDAC, sb_edac: Fix rank lookup on Broadwell (bsc#979521).
- EDAC/sb_edac: Fix computation of channel address (bsc#979521).
- EDAC: Correct channel count limit (bsc#979521).
- EDAC: Remove arbitrary limit on number of channels (bsc#979521).
- EDAC: Use static attribute groups for managing sysfs entries (bsc#979521).
- FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049).
- FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049).
- FS-Cache: Fix cancellation of in-progress operation (bsc#971049).
- FS-Cache: Handle a new operation submitted against a killed object (bsc#971049).
- FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049).
- FS-Cache: Out of line fscache_operation_init() (bsc#971049).
- FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049).
- FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049).
- FS-Cache: Reduce cookie ref count if submit fails (bsc#971049).
- FS-Cache: Synchronise object death state change vs operation submission (bsc#971049).
- FS-Cache: The operation cancellation method needs calling in more places (bsc#971049).
- FS-Cache: Timeout for releasepage() (bsc#971049).
- FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049).
- FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049).
- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- Fix kabi issue (bsc#971049).
- Input: i8042 - lower log level for 'no controller' message (bsc#945345).
- KVM: x86: expose invariant tsc cpuid bit (v2) (bsc#971770).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).
- NVMe: Unify controller probe and resume (bsc#979347).
- NVMe: init nvme queue before enabling irq (bsc#662458).
- PCI/AER: Clear error status registers during enumeration and restore (bsc#985978).
- Refresh patches.xen/xen-netback-coalesce: Restore copying of SKBs with head exceeding page size (bsc#978469).
- Revert 'scsi: fix soft lockup in scsi_remove_target() on module removal' (bsc#970609).
- SCSI: Increase REPORT_LUNS timeout (bsc#982282).
- USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982698).
- Update patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.
- Update patches.drivers/nvme-0106-init-nvme-queue-before-enabling-irq.patch (bsc#962742). Fix incorrect bugzilla referece.
- Update patches.kernel.org/patch-3.12.55-56 references (add bsc#973570).
- Use mainline variant of hyperv KVP IP failover patch (bnc#978527)
- VSOCK: Fix lockdep issue (bsc#977417).
- VSOCK: sock_put wasn't safe to call in interrupt context (bsc#977417).
- Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).
- base: make module_create_drivers_dir race-free (bnc#983977).
- block: do not check request size in blk_cloned_rq_check_limits() (bsc#972124).
- cachefiles: perform test on s_blocksize when opening cache file (bsc#971049).
- cdc_ncm: workaround for EM7455 'silent' data interface (bnc#988552).
- ceph fscache: Introduce a routine for uncaching single no data page from fscache.
- ceph fscache: Uncaching no data page from fscache in readpage().
- ceph: Asynchronous IO support.
- ceph: Avoid to propagate the invalid page point.
- ceph: Clean up if error occurred in finish_read().
- ceph: EIO all operations after forced umount.
- ceph: Implement writev/pwritev for sync operation.
- ceph: Remove racey watch/notify event infrastructure (bsc#964727)
- ceph: Remove racey watch/notify event infrastructure (bsc#964727)
- ceph: add acl for cephfs.
- ceph: add acl, noacl options for cephfs mount.
- ceph: add get_name() NFS export callback.
- ceph: add get_parent() NFS export callback.
- ceph: add imported caps when handling cap export message.
- ceph: add inline data to pagecache.
- ceph: add missing init_acl() for mkdir() and atomic_open().
- ceph: add open export target session helper.
- ceph: add request to i_unsafe_dirops when getting unsafe reply.
- ceph: additional debugfs output.
- ceph: always re-send cap flushes when MDS recovers.
- ceph: avoid block operation when !TASK_RUNNING (ceph_get_caps).
- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_close_sessions).
- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_sync).
- ceph: avoid releasing caps that are being used.
- ceph: avoid sending unnessesary FLUSHSNAP message.
- ceph: avoid useless ceph_get_dentry_parent_inode() in ceph_rename().
- ceph: cast PAGE_SIZE to size_t in ceph_sync_write().
- ceph: ceph_frag_contains_value can be boolean.
- ceph: ceph_get_parent() can be static.
- ceph: check OSD caps before read/write.
- ceph: check buffer size in ceph_vxattrcb_layout().
- ceph: check caps in filemap_fault and page_mkwrite.
- ceph: check directory's completeness before emitting directory entry.
- ceph: check inode caps in ceph_d_revalidate.
- ceph: check unsupported fallocate mode.
- ceph: check zero length in ceph_sync_read().
- ceph: checking for IS_ERR instead of NULL.
- ceph: cleanup unsafe requests when reconnecting is denied.
- ceph: cleanup use of ceph_msg_get.
- ceph: clear directory's completeness when creating file.
- ceph: convert inline data to normal data before data write.
- ceph: do not assume r_old_dentry[_dir] always set together.
- ceph: do not chain inode updates to parent fsync.
- ceph: do not grabs open file reference for aborted request.
- ceph: do not include ceph.{file,dir}.layout vxattr in listxattr().
- ceph: do not include used caps in cap_wanted.
- ceph: do not invalidate page cache when inode is no longer used.
- ceph: do not mark dirty caps when there is no auth cap.
- ceph: do not pre-allocate space for cap release messages.
- ceph: do not set r_old_dentry_dir on link().
- ceph: do not trim auth cap when there are cap snaps.
- ceph: do not zero i_wrbuffer_ref when reconnecting is denied.
- ceph: drop cap releases in requests composed before cap reconnect.
- ceph: drop extra open file reference in ceph_atomic_open().
- ceph: drop unconnected inodes.
- ceph: exclude setfilelock requests when calculating oldest tid.
- ceph: export ceph_session_state_name function.
- ceph: fetch inline data when getting Fcr cap refs.
- ceph: fix __dcache_readdir().
- ceph: fix a comment typo.
- ceph: fix append mode write.
- ceph: fix atomic_open snapdir.
- ceph: fix bool assignments.
- ceph: fix cache revoke race.
- ceph: fix ceph_dir_llseek().
- ceph: fix ceph_fh_to_parent().
- ceph: fix ceph_removexattr().
- ceph: fix ceph_set_acl().
- ceph: fix ceph_writepages_start().
- ceph: fix dcache/nocache mount option.
- ceph: fix dentry leaks.
- ceph: fix directory fsync.
- ceph: fix divide-by-zero in __validate_layout().
- ceph: fix double page_unlock() in page_mkwrite().
- ceph: fix dout() compile warnings in ceph_filemap_fault().
- ceph: fix file lock interruption.
- ceph: fix flush tid comparision.
- ceph: fix flushing caps.
- ceph: fix llistxattr on symlink.
- ceph: fix message length computation.
- ceph: fix mksnap crash.
- ceph: fix null pointer dereference in send_mds_reconnect().
- ceph: fix pr_fmt() redefinition.
- ceph: fix queuing inode to mdsdir's snaprealm.
- ceph: fix reading inline data when i_size greater than PAGE_SIZE.
- ceph: fix request time stamp encoding.
- ceph: fix reset_readdir().
- ceph: fix setting empty extended attribute.
- ceph: fix sizeof(struct tYpO *) typo.
- ceph: fix snap context leak in error path.
- ceph: fix trim caps.
- ceph: fix uninline data function.
- ceph: flush cap release queue when trimming session caps.
- ceph: flush inline version.
- ceph: forbid mandatory file lock.
- ceph: fscache: Update object store limit after file writing.
- ceph: fscache: Wait for completion of object initialization.
- ceph: fscache: add an interface to synchronize object store limit.
- ceph: get inode size for each append write.
- ceph: handle -ESTALE reply.
- ceph: handle SESSION_FORCE_RO message.
- ceph: handle cap export race in try_flush_caps().
- ceph: handle cap import atomically.
- ceph: handle frag mismatch between readdir request and reply.
- ceph: handle race between cap reconnect and cap release.
- ceph: handle session flush message.
- ceph: hold on to exclusive caps on complete directories.
- ceph: implement readv/preadv for sync operation.
- ceph: improve readahead for file holes.
- ceph: improve reference tracking for snaprealm.
- ceph: include time stamp in every MDS request.
- ceph: include time stamp in replayed MDS requests.
- ceph: initial CEPH_FEATURE_FS_FILE_LAYOUT_V2 support.
- ceph: initialize inode before instantiating dentry.
- ceph: introduce a new inode flag indicating if cached dentries are ordered.
- ceph: introduce ceph_fill_fragtree().
- ceph: introduce global empty snap context.
- ceph: invalidate dirty pages after forced umount.
- ceph: keep i_snap_realm while there are writers.
- ceph: kstrdup() memory handling.
- ceph: let MDS adjust readdir 'frag'.
- ceph: make ceph_forget_all_cached_acls() static inline.
- ceph: make fsync() wait unsafe requests that created/modified inode.
- ceph: make sure syncfs flushes all cap snaps.
- ceph: make sure write caps are registered with auth MDS.
- ceph: match wait_for_completion_timeout return type.
- ceph: message versioning fixes.
- ceph: move ceph_find_inode() outside the s_mutex.
- ceph: move spinlocking into ceph_encode_locks_to_buffer and ceph_count_locks.
- ceph: no need to get parent inode in ceph_open.
- ceph: parse inline data in MClientReply and MClientCaps.
- ceph: pre-allocate ceph_cap struct for ceph_add_cap().
- ceph: pre-allocate data structure that tracks caps flushing.
- ceph: preallocate buffer for readdir reply.
- ceph: print inode number for LOOKUPINO request.
- ceph: properly apply umask when ACL is enabled.
- ceph: properly handle XATTR_CREATE and XATTR_REPLACE.
- ceph: properly mark empty directory as complete.
- ceph: properly release page upon error.
- ceph: properly zero data pages for file holes.
- ceph: provide seperate {inode,file}_operations for snapdir.
- ceph: queue cap release in __ceph_remove_cap().
- ceph: queue vmtruncate if necessary when handing cap grant/revoke.
- ceph: ratelimit warn messages for MDS closes session.
- ceph: re-send AIO write request when getting -EOLDSNAP error.
- ceph: re-send flushing caps (which are revoked) in reconnect stage.
- ceph: re-send requests when MDS enters reconnecting stage.
- ceph: refactor readpage_nounlock() to make the logic clearer.
- ceph: remember subtree root dirfrag's auth MDS.
- ceph: remove exported caps when handling cap import message.
- ceph: remove outdated frag information.
- ceph: remove redundant code for max file size verification.
- ceph: remove redundant declaration.
- ceph: remove redundant memset(0).
- ceph: remove redundant test of head->safe and silence static analysis warnings.
- ceph: remove the useless judgement.
- ceph: remove unused functions in ceph_frag.h.
- ceph: remove unused stringification macros.
- ceph: remove useless ACL check.
- ceph: remove xattr when null value is given to setxattr().
- ceph: rename snapshot support.
- ceph: replace comma with a semicolon.
- ceph: request xattrs if xattr_version is zero.
- ceph: reserve caps for file layout/lock MDS requests.
- ceph: reset r_resend_mds after receiving -ESTALE.
- ceph: return error for traceless reply race.
- ceph: rework dcache readdir.
- ceph: send TID of the oldest pending caps flush to MDS.
- ceph: send client metadata to MDS.
- ceph: set caps count after composing cap reconnect message.
- ceph: set i_head_snapc when getting CEPH_CAP_FILE_WR reference.
- ceph: set mds_wanted when MDS reply changes a cap to auth cap.
- ceph: show nocephx_require_signatures and notcp_nodelay options.
- ceph: show non-default options only.
- ceph: simplify ceph_fh_to_dentry().
- ceph: simplify two mount_timeout sites.
- ceph: skip invalid dentry during dcache readdir.
- ceph: support inline data feature.
- ceph: switch some GFP_NOFS memory allocation to GFP_KERNEL.
- ceph: sync read inline data.
- ceph: take snap_rwsem when accessing snap realm's cached_context.
- ceph: tolerate bad i_size for symlink inode (bsc#985232).
- ceph: track pending caps flushing accurately.
- ceph: track pending caps flushing globally.
- ceph: trim unused inodes before reconnecting to recovering MDS.
- ceph: trivial comment fix.
- ceph: update i_max_size even if inode version does not change.
- ceph: update inode fields according to issued caps.
- ceph: use %zu for len in ceph_fill_inline_data().
- ceph: use ceph_seq_cmp() to compare migrate_seq.
- ceph: use empty snap context for uninline_data and get_pool_perm.
- ceph: use fl->fl_file as owner identifier of flock and posix lock.
- ceph: use fl->fl_type to decide flock operation.
- ceph: use fpos_cmp() to compare dentry positions.
- ceph: use getattr request to fetch inline data.
- ceph: use i_size_{read,write} to get/set i_size.
- ceph: use msecs_to_jiffies for time conversion.
- ceph: use pagelist to present MDS request data.
- ceph: use truncate_pagecache() instead of truncate_inode_pages().
- ceph_sync_{,direct_}write: fix an oops on ceph_osdc_new_request() failure.
- client: include kernel version in client metadata.
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- crush: add chooseleaf_stable tunable.
- crush: decode and initialize chooseleaf_stable.
- crush: ensure bucket id is valid before indexing buckets array.
- crush: ensure take bucket value is valid.
- crush: fix crash from invalid 'take' argument.
- crush: sync up with userspace.
- crypto: testmgr - allow rfc3686 aes-ctr variants in fips mode (bsc#958390).
- crypto: testmgr - mark authenticated ctr(aes) also as FIPS able (bsc#958390).
- drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904).
- drm/mgag200: Add support for a new rev of G200e (bsc#983904).
- drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904).
- drm/mgag200: remove unused variables (bsc#983904).
- drm: qxl: Workaround for buggy user-space (bsc#981344).
- efifb: Add support for 64-bit frame buffer addresses (bsc#973499).
- efifb: Fix 16 color palette entry calculation (bsc#983318).
- efifb: Fix KABI of screen_info struct (bsc#973499).
- ehci-pci: enable interrupt on BayTrail (bnc#947337).
- enic: set netdev->vlan_features (bsc#966245).
- fs/ceph/debugfs.c: replace seq_printf by seq_puts.
- fs/ceph: replace pr_warning by pr_warn.
- hid-elo: kill not flush the work (bnc#982354).
- hv: util: Pass the channel information during the init call (bnc#978527).
- hv: utils: Invoke the poll function after handshake (bnc#978527).
- hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read().
- iommu/vt-d: Enable QI on all IOMMUs before setting root entry (bsc#975772).
- ipvs: count pre-established TCP states as active (bsc#970114).
- kabi/severities: Added raw3270_* PASS to allow IBM LTC changes (bnc#979922, LTC#141736).
- kabi/severities: Allow changes in zpci_* symbols (bsc#974692)
- kabi/severities: Whitelist libceph and rbd (bsc#964727).
- kabi/severities: Whitelist libceph and rbd.
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846).
- kgraft/gfs2: Do not block livepatching in the log daemon for too long.
- kgraft/xen: Do not block livepatching in the XEN blkif kthread.
- libceph: Avoid holding the zero page on ceph_msgr_slab_init errors.
- libceph: Fix ceph_tcp_sendpage()'s more boolean usage.
- libceph: MOSDOpReply v7 encoding.
- libceph: Remove spurious kunmap() of the zero page.
- libceph: a couple tweaks for wait loops.
- libceph: add nocephx_sign_messages option.
- libceph: advertise support for TUNABLES5.
- libceph: advertise support for keepalive2.
- libceph: allow setting osd_req_op's flags.
- libceph: check data_len in ->alloc_msg().
- libceph: clear messenger auth_retry flag if we fault.
- libceph: clear msg->con in ceph_msg_release() only.
- libceph: do not access invalid memory in keepalive2 path.
- libceph: do not spam dmesg with stray reply warnings.
- libceph: drop authorizer check from cephx msg signing routines.
- libceph: evaluate osd_req_op_data() arguments only once.
- libceph: fix authorizer invalidation, take 2.
- libceph: fix ceph_msg_revoke().
- libceph: fix wrong name 'Ceph filesystem for Linux'.
- libceph: handle writefull for OSD op extent init (bsc#980706).
- libceph: introduce ceph_x_authorizer_cleanup().
- libceph: invalidate AUTH in addition to a service ticket.
- libceph: kill off ceph_x_ticket_handler::validity.
- libceph: move ceph_file_layout helpers to ceph_fs.h.
- libceph: msg signing callouts do not need con argument.
- libceph: nuke time_sub().
- libceph: properly release STAT request's raw_data_in.
- libceph: remove con argument in handle_reply().
- libceph: remove outdated comment.
- libceph: remove the unused macro AES_KEY_SIZE.
- libceph: rename con_work() to ceph_con_workfn().
- libceph: set 'exists' flag for newly up osd.
- libceph: stop duplicating client fields in messenger.
- libceph: store timeouts in jiffies, verify user input.
- libceph: treat sockaddr_storage with uninitialized family as blank.
- libceph: use keepalive2 to verify the mon session is alive.
- libceph: use list_for_each_entry_safe.
- libceph: use list_next_entry instead of list_entry_next.
- libceph: use local variable cursor instead of msg->cursor.
- libceph: use the right footer size when skipping a message.
- libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846).
- md/raid56: Do not perform reads to support writes until stripe is ready.
- md/raid5: Ensure a batch member is not handled prematurely (bsc#953048).
- md/raid5: For stripe with R5_ReadNoMerge, we replace REQ_FLUSH with REQ_NOMERGE.
- md/raid5: add handle_flags arg to break_stripe_batch_list (bsc#953048).
- md/raid5: allow the stripe_cache to grow and shrink (bsc#953048).
- md/raid5: always set conf->prev_chunk_sectors and ->prev_algo (bsc#953048).
- md/raid5: avoid races when changing cache size (bsc#953048).
- md/raid5: avoid reading parity blocks for full-stripe write to degraded array (bsc#953048).
- md/raid5: be more selective about distributing flags across batch (bsc#953048).
- md/raid5: break stripe-batches when the array has failed (bsc#953048).
- md/raid5: call break_stripe_batch_list from handle_stripe_clean_event (bsc#953048).
- md/raid5: change ->>inactive_blocked to a bit-flag (bsc#953048).
- md/raid5: clear R5_NeedReplace when no longer needed (bsc#953048).
- md/raid5: close race between STRIPE_BIT_DELAY and batching (bsc#953048).
- md/raid5: close recently introduced race in stripe_head management.
- md/raid5: consider updating reshape_position at start of reshape (bsc#953048).
- md/raid5: deadlock between retry_aligned_read with barrier io (bsc#953048).
- md/raid5: do not do chunk aligned read on degraded array (bsc#953048).
- md/raid5: do not index beyond end of array in need_this_block() (bsc#953048).
- md/raid5: do not let shrink_slab shrink too far (bsc#953048).
- md/raid5: duplicate some more handle_stripe_clean_event code in break_stripe_batch_list (bsc#953048).
- md/raid5: ensure device failure recorded before write request returns (bsc#953048).
- md/raid5: ensure whole batch is delayed for all required bitmap updates (bsc#953048).
- md/raid5: fix allocation of 'scribble' array (bsc#953048).
- md/raid5: fix another livelock caused by non-aligned writes (bsc#953048).
- md/raid5: fix handling of degraded stripes in batches (bsc#953048).
- md/raid5: fix init_stripe() inconsistencies (bsc#953048).
- md/raid5: fix locking in handle_stripe_clean_event() (bsc#953048).
- md/raid5: fix newly-broken locking in get_active_stripe.
- md/raid5: handle possible race as reshape completes (bsc#953048).
- md/raid5: ignore released_stripes check (bsc#953048).
- md/raid5: more incorrect BUG_ON in handle_stripe_fill (bsc#953048).
- md/raid5: move max_nr_stripes management into grow_one_stripe and drop_one_stripe (bsc#953048).
- md/raid5: need_this_block: start simplifying the last two conditions (bsc#953048).
- md/raid5: need_this_block: tidy/fix last condition (bsc#953048).
- md/raid5: new alloc_stripe() to allocate an initialize a stripe (bsc#953048).
- md/raid5: pass gfp_t arg to grow_one_stripe() (bsc#953048).
- md/raid5: per hash value and exclusive wait_for_stripe (bsc#953048).
- md/raid5: preserve STRIPE_PREREAD_ACTIVE in break_stripe_batch_list.
- md/raid5: remove condition test from check_break_stripe_batch_list (bsc#953048).
- md/raid5: remove incorrect 'min_t()' when calculating writepos (bsc#953048).
- md/raid5: remove redundant check in stripe_add_to_batch_list() (bsc#953048).
- md/raid5: separate large if clause out of fetch_block() (bsc#953048).
- md/raid5: separate out the easy conditions in need_this_block (bsc#953048).
- md/raid5: split wait_for_stripe and introduce wait_for_quiescent (bsc#953048).
- md/raid5: strengthen check on reshape_position at run (bsc#953048).
- md/raid5: switch to use conf->chunk_sectors in place of mddev->chunk_sectors where possible (bsc#953048).
- md/raid5: use ->lock to protect accessing raid5 sysfs attributes (bsc#953048).
- md/raid5: use bio_list for the list of bios to return (bsc#953048).
- md: be careful when testing resync_max against curr_resync_completed (bsc#953048).
- md: do_release_stripe(): No need to call md_wakeup_thread() twice (bsc#953048).
- md: make sure MD_RECOVERY_DONE is clear before starting recovery/resync (bsc#953048).
- md: remove unwanted white space from md.c (bsc#953048).
- md: use set_bit/clear_bit instead of shift/mask for bi_flags changes (bsc#953048).
- mds: check cap ID when handling cap export message.
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- mmc: sdhci: Allow for irq being shared (bnc#977582).
- mpt3sas: Fix use sas_is_tlr_enabled API before enabling MPI2_SCSIIO_CONTROL_TLR_ON flag (bsc#967640).
- net/qlge: Avoids recursive EEH error (bsc#954847).
- net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667).
- net: Start with correct mac_len in skb_network_protocol (bsc#968667).
- net: disable fragment reassembly if high_thresh is set to zero (bsc#970506).
- net: fix wrong mac_len calculation for vlans (bsc#968667).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- nvme: do not poll the CQ from the kthread (bsc#975788, bsc#965087).
- nvme: fix max_segments integer truncation (bsc#676471).
- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).
- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).
- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).
- perf/rapl: Fix sysfs_show() initialization for RAPL PMU (bsc#979489).
- perf/x86/intel: Add Intel RAPL PP1 energy counter support (bsc#979489).
- powerpc/book3s64: Fix branching to OOL handlers in relocatable kernel (bsc@976821).
- powerpc/book3s64: Remove __end_handlers marker (bsc#976821).
- qeth: delete napi struct when removing a qeth device (bnc#988215, LTC#143590).
- raid5: Retry R5_ReadNoMerge flag when hit a read error.
- raid5: add a new flag to track if a stripe can be batched (bsc#953048).
- raid5: add an option to avoid copy data from bio to stripe cache (bsc#953048).
- raid5: avoid release list until last reference of the stripe (bsc#953048).
- raid5: batch adjacent full stripe write (bsc#953048).
- raid5: check faulty flag for array status during recovery (bsc#953048).
- raid5: check_reshape() shouldn't call mddev_suspend (bsc#953048).
- raid5: fix a race of stripe count check.
- raid5: fix broken async operation chain (bsc#953048).
- raid5: get_active_stripe avoids device_lock.
- raid5: handle expansion/resync case with stripe batching (bsc#953048).
- raid5: handle io error of batch list (bsc#953048).
- raid5: make_request does less prepare wait.
- raid5: relieve lock contention in get_active_stripe().
- raid5: relieve lock contention in get_active_stripe().
- raid5: revert e9e4c377e2f563 to fix a livelock (bsc#953048).
- raid5: speedup sync_request processing (bsc#953048).
- raid5: track overwrite disk count (bsc#953048).
- raid5: update analysis state for failed stripe (bsc#953048).
- raid5: use flex_array for scribble data (bsc#953048).
- rbd: bump queue_max_segments.
- rbd: delete an unnecessary check before rbd_dev_destroy().
- rbd: do not free rbd_dev outside of the release callback.
- rbd: do not put snap_context twice in rbd_queue_workfn().
- rbd: drop null test before destroy functions.
- rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394).
- rbd: plug rbd_dev->header.object_prefix memory leak.
- rbd: rbd_wq comment is obsolete.
- rbd: remove duplicate calls to rbd_dev_mapping_clear().
- rbd: report unsupported features to syslog (bsc#979169).
- rbd: return -ENOMEM instead of pool id if rbd_dev_create() fails.
- rbd: set device_type::release instead of device::release.
- rbd: set max_sectors explicitly.
- rbd: store rbd_options in rbd_device.
- rbd: terminate rbd_opts_tokens with Opt_err.
- rbd: timeout watch teardown on unmap with mount_timeout.
- rbd: use writefull op for object size writes.
- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 6c6d86d3cdc26f7746fe4ba2bef8859b5aeb346c.
- s390/3270: add missing tty_kref_put (bnc#979922, LTC#141736).
- s390/3270: avoid endless I/O loop with disconnected 3270 terminals (bnc#979922, LTC#141736).
- s390/3270: fix garbled output on 3270 tty view (bnc#979922, LTC#141736).
- s390/3270: fix view reference counting (bnc#979922, LTC#141736).
- s390/3270: handle reconnect of a tty with a different size (bnc#979922, LTC#141736).
- s390/3270: hangup the 3270 tty after a disconnect (bnc#979922, LTC#141736).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979922, LTC#141456).
- s390/pci: add extra padding to function measurement block (bnc#974692, LTC#139445).
- s390/pci: enforce fmb page boundary rule (bnc#974692, LTC#139445).
- s390/pci: extract software counters from fmb (bnc#974692, LTC#139445).
- s390/pci: remove pdev pointer from arch data (bnc#974692, LTC#139444).
- s390/pci_dma: fix DMA table corruption with > 4 TB main memory (bnc#974692, LTC#139401).
- s390/pci_dma: handle dma table failures (bnc#974692, LTC#139442).
- s390/pci_dma: improve debugging of errors during dma map (bnc#974692, LTC#139442).
- s390/pci_dma: unify label of invalid translation table entries (bnc#974692, LTC#139442).
- s390/spinlock: avoid yield to non existent cpu (bnc#979922, LTC#141106).
- s390: fix test_fp_ctl inline assembly contraints (bnc#988215, LTC#143138).
- sb_edac: Fix a typo and a thinko in address handling for Haswell (bsc#979521).
- sb_edac: Fix support for systems with two home agents per socket (bsc#979521).
- sb_edac: correctly fetch DIMM width on Ivy Bridge and Haswell (bsc#979521).
- sb_edac: look harder for DDRIO on Haswell systems (bsc#979521).
- sb_edac: support for Broadwell -EP and -EX (bsc#979521).
- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).
- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).
- sched/x86: Fix up typo in topology detection (bsc#974165).
- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).
- scsi-bnx2fc-handle_scsi_retry_delay
- scsi-bnx2fc-soft_lockup_when_rmmod
- scsi: Avoid crashing if device uses DIX but adapter does not support it (bsc#969016).
- sd: get disk reference in sd_check_events() (bnc#897662).
- target/rbd: do not put snap_context twice (bsc#981143).
- target/rbd: do not put snap_context twice (bsc#981143).
- target/rbd: remove caw_mutex usage (bsc#981143).
- target/rbd: remove caw_mutex usage (bsc#981143).
- usb: quirk to stop runtime PM for Intel 7260 (bnc#984456).
- vgaarb: Add more context to error messages (bsc#976868).
- wait: introduce wait_event_exclusive_cmd (bsc#953048).
- x86 EDAC, sb_edac.c: Repair damage introduced when 'fixing' channel address (bsc#979521).
- x86 EDAC, sb_edac.c: Take account of channel hashing when needed (bsc#979521).
- x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165).
- x86/efi: parse_efi_setup() build fix (bsc#979485).
- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- x86: standardize mmap_rnd() usage (bnc#974308).
- xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).
- xfs: fix premature enospc on inode allocation (bsc#984148).
- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).
- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).
Patchnames
SUSE-SLE-RT-12-SP1-2016-1133
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.61 to receive various security and bugfixes.\n\nMain feature additions:\n- Improved support for Clustered File System (CephFS, fate#318586).\n\nThe following security bugs were fixed:\n- CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547).\n- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).\n- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).\n- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).\n- CVE-2015-8551: The PCI backend driver in Xen, when running on an x86 system, allowed local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka \u0027Linux pciback missing sanity checks (bnc#957990).\n- CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system, allowed local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka \u0027Linux pciback missing sanity checks (bnc#957990).\n- CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).\n- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).\n- CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308).\n- CVE-2016-3707: The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel allowed remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file (bnc#980246).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).\n- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).\n- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n\nThe following non-security bugs were fixed:\n- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).\n- Add wait_event_cmd() (bsc#953048).\n- Btrfs: be more precise on errors when getting an inode from disk (bsc#981038).\n- Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685).\n- Btrfs: do not return EBUSY on concurrent subvolume mounts (bsc#951844).\n- Btrfs: do not use src fd for printk (bsc#980348).\n- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685).\n- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685).\n- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685).\n- Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685).\n- Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).\n- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685).\n- Btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).\n- Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933).\n- Btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844).\n- CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049).\n- CacheFiles: Handle object being killed before being set up (bsc#971049).\n- EDAC, sb_edac: Add support for duplicate device IDs (bsc#979521).\n- EDAC, sb_edac: Fix TAD presence check for sbridge_mci_bind_devs() (bsc#979521).\n- EDAC, sb_edac: Fix rank lookup on Broadwell (bsc#979521).\n- EDAC/sb_edac: Fix computation of channel address (bsc#979521).\n- EDAC: Correct channel count limit (bsc#979521).\n- EDAC: Remove arbitrary limit on number of channels (bsc#979521).\n- EDAC: Use static attribute groups for managing sysfs entries (bsc#979521).\n- FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049).\n- FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049).\n- FS-Cache: Fix cancellation of in-progress operation (bsc#971049).\n- FS-Cache: Handle a new operation submitted against a killed object (bsc#971049).\n- FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049).\n- FS-Cache: Out of line fscache_operation_init() (bsc#971049).\n- FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049).\n- FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049).\n- FS-Cache: Reduce cookie ref count if submit fails (bsc#971049).\n- FS-Cache: Synchronise object death state change vs operation submission (bsc#971049).\n- FS-Cache: The operation cancellation method needs calling in more places (bsc#971049).\n- FS-Cache: Timeout for releasepage() (bsc#971049).\n- FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049).\n- FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049).\n- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)\n- Fix kabi issue (bsc#971049).\n- Input: i8042 - lower log level for \u0027no controller\u0027 message (bsc#945345).\n- KVM: x86: expose invariant tsc cpuid bit (v2) (bsc#971770).\n- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).\n- NVMe: Unify controller probe and resume (bsc#979347).\n- NVMe: init nvme queue before enabling irq (bsc#662458).\n- PCI/AER: Clear error status registers during enumeration and restore (bsc#985978).\n- Refresh patches.xen/xen-netback-coalesce: Restore copying of SKBs with head exceeding page size (bsc#978469).\n- Revert \u0027scsi: fix soft lockup in scsi_remove_target() on module removal\u0027 (bsc#970609).\n- SCSI: Increase REPORT_LUNS timeout (bsc#982282).\n- USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982698).\n- Update patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.\n- Update patches.drivers/nvme-0106-init-nvme-queue-before-enabling-irq.patch (bsc#962742). Fix incorrect bugzilla referece.\n- Update patches.kernel.org/patch-3.12.55-56 references (add bsc#973570).\n- Use mainline variant of hyperv KVP IP failover patch (bnc#978527)\n- VSOCK: Fix lockdep issue (bsc#977417).\n- VSOCK: sock_put wasn\u0027t safe to call in interrupt context (bsc#977417).\n- Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).\n- base: make module_create_drivers_dir race-free (bnc#983977).\n- block: do not check request size in blk_cloned_rq_check_limits() (bsc#972124).\n- cachefiles: perform test on s_blocksize when opening cache file (bsc#971049).\n- cdc_ncm: workaround for EM7455 \u0027silent\u0027 data interface (bnc#988552).\n- ceph fscache: Introduce a routine for uncaching single no data page from fscache.\n- ceph fscache: Uncaching no data page from fscache in readpage().\n- ceph: Asynchronous IO support.\n- ceph: Avoid to propagate the invalid page point.\n- ceph: Clean up if error occurred in finish_read().\n- ceph: EIO all operations after forced umount.\n- ceph: Implement writev/pwritev for sync operation.\n- ceph: Remove racey watch/notify event infrastructure (bsc#964727)\n- ceph: Remove racey watch/notify event infrastructure (bsc#964727)\n- ceph: add acl for cephfs.\n- ceph: add acl, noacl options for cephfs mount.\n- ceph: add get_name() NFS export callback.\n- ceph: add get_parent() NFS export callback.\n- ceph: add imported caps when handling cap export message.\n- ceph: add inline data to pagecache.\n- ceph: add missing init_acl() for mkdir() and atomic_open().\n- ceph: add open export target session helper.\n- ceph: add request to i_unsafe_dirops when getting unsafe reply.\n- ceph: additional debugfs output.\n- ceph: always re-send cap flushes when MDS recovers.\n- ceph: avoid block operation when !TASK_RUNNING (ceph_get_caps).\n- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_close_sessions).\n- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_sync).\n- ceph: avoid releasing caps that are being used.\n- ceph: avoid sending unnessesary FLUSHSNAP message.\n- ceph: avoid useless ceph_get_dentry_parent_inode() in ceph_rename().\n- ceph: cast PAGE_SIZE to size_t in ceph_sync_write().\n- ceph: ceph_frag_contains_value can be boolean.\n- ceph: ceph_get_parent() can be static.\n- ceph: check OSD caps before read/write.\n- ceph: check buffer size in ceph_vxattrcb_layout().\n- ceph: check caps in filemap_fault and page_mkwrite.\n- ceph: check directory\u0027s completeness before emitting directory entry.\n- ceph: check inode caps in ceph_d_revalidate.\n- ceph: check unsupported fallocate mode.\n- ceph: check zero length in ceph_sync_read().\n- ceph: checking for IS_ERR instead of NULL.\n- ceph: cleanup unsafe requests when reconnecting is denied.\n- ceph: cleanup use of ceph_msg_get.\n- ceph: clear directory\u0027s completeness when creating file.\n- ceph: convert inline data to normal data before data write.\n- ceph: do not assume r_old_dentry[_dir] always set together.\n- ceph: do not chain inode updates to parent fsync.\n- ceph: do not grabs open file reference for aborted request.\n- ceph: do not include ceph.{file,dir}.layout vxattr in listxattr().\n- ceph: do not include used caps in cap_wanted.\n- ceph: do not invalidate page cache when inode is no longer used.\n- ceph: do not mark dirty caps when there is no auth cap.\n- ceph: do not pre-allocate space for cap release messages.\n- ceph: do not set r_old_dentry_dir on link().\n- ceph: do not trim auth cap when there are cap snaps.\n- ceph: do not zero i_wrbuffer_ref when reconnecting is denied.\n- ceph: drop cap releases in requests composed before cap reconnect.\n- ceph: drop extra open file reference in ceph_atomic_open().\n- ceph: drop unconnected inodes.\n- ceph: exclude setfilelock requests when calculating oldest tid.\n- ceph: export ceph_session_state_name function.\n- ceph: fetch inline data when getting Fcr cap refs.\n- ceph: fix __dcache_readdir().\n- ceph: fix a comment typo.\n- ceph: fix append mode write.\n- ceph: fix atomic_open snapdir.\n- ceph: fix bool assignments.\n- ceph: fix cache revoke race.\n- ceph: fix ceph_dir_llseek().\n- ceph: fix ceph_fh_to_parent().\n- ceph: fix ceph_removexattr().\n- ceph: fix ceph_set_acl().\n- ceph: fix ceph_writepages_start().\n- ceph: fix dcache/nocache mount option.\n- ceph: fix dentry leaks.\n- ceph: fix directory fsync.\n- ceph: fix divide-by-zero in __validate_layout().\n- ceph: fix double page_unlock() in page_mkwrite().\n- ceph: fix dout() compile warnings in ceph_filemap_fault().\n- ceph: fix file lock interruption.\n- ceph: fix flush tid comparision.\n- ceph: fix flushing caps.\n- ceph: fix llistxattr on symlink.\n- ceph: fix message length computation.\n- ceph: fix mksnap crash.\n- ceph: fix null pointer dereference in send_mds_reconnect().\n- ceph: fix pr_fmt() redefinition.\n- ceph: fix queuing inode to mdsdir\u0027s snaprealm.\n- ceph: fix reading inline data when i_size greater than PAGE_SIZE.\n- ceph: fix request time stamp encoding.\n- ceph: fix reset_readdir().\n- ceph: fix setting empty extended attribute.\n- ceph: fix sizeof(struct tYpO *) typo.\n- ceph: fix snap context leak in error path.\n- ceph: fix trim caps.\n- ceph: fix uninline data function.\n- ceph: flush cap release queue when trimming session caps.\n- ceph: flush inline version.\n- ceph: forbid mandatory file lock.\n- ceph: fscache: Update object store limit after file writing.\n- ceph: fscache: Wait for completion of object initialization.\n- ceph: fscache: add an interface to synchronize object store limit.\n- ceph: get inode size for each append write.\n- ceph: handle -ESTALE reply.\n- ceph: handle SESSION_FORCE_RO message.\n- ceph: handle cap export race in try_flush_caps().\n- ceph: handle cap import atomically.\n- ceph: handle frag mismatch between readdir request and reply.\n- ceph: handle race between cap reconnect and cap release.\n- ceph: handle session flush message.\n- ceph: hold on to exclusive caps on complete directories.\n- ceph: implement readv/preadv for sync operation.\n- ceph: improve readahead for file holes.\n- ceph: improve reference tracking for snaprealm.\n- ceph: include time stamp in every MDS request.\n- ceph: include time stamp in replayed MDS requests.\n- ceph: initial CEPH_FEATURE_FS_FILE_LAYOUT_V2 support.\n- ceph: initialize inode before instantiating dentry.\n- ceph: introduce a new inode flag indicating if cached dentries are ordered.\n- ceph: introduce ceph_fill_fragtree().\n- ceph: introduce global empty snap context.\n- ceph: invalidate dirty pages after forced umount.\n- ceph: keep i_snap_realm while there are writers.\n- ceph: kstrdup() memory handling.\n- ceph: let MDS adjust readdir \u0027frag\u0027.\n- ceph: make ceph_forget_all_cached_acls() static inline.\n- ceph: make fsync() wait unsafe requests that created/modified inode.\n- ceph: make sure syncfs flushes all cap snaps.\n- ceph: make sure write caps are registered with auth MDS.\n- ceph: match wait_for_completion_timeout return type.\n- ceph: message versioning fixes.\n- ceph: move ceph_find_inode() outside the s_mutex.\n- ceph: move spinlocking into ceph_encode_locks_to_buffer and ceph_count_locks.\n- ceph: no need to get parent inode in ceph_open.\n- ceph: parse inline data in MClientReply and MClientCaps.\n- ceph: pre-allocate ceph_cap struct for ceph_add_cap().\n- ceph: pre-allocate data structure that tracks caps flushing.\n- ceph: preallocate buffer for readdir reply.\n- ceph: print inode number for LOOKUPINO request.\n- ceph: properly apply umask when ACL is enabled.\n- ceph: properly handle XATTR_CREATE and XATTR_REPLACE.\n- ceph: properly mark empty directory as complete.\n- ceph: properly release page upon error.\n- ceph: properly zero data pages for file holes.\n- ceph: provide seperate {inode,file}_operations for snapdir.\n- ceph: queue cap release in __ceph_remove_cap().\n- ceph: queue vmtruncate if necessary when handing cap grant/revoke.\n- ceph: ratelimit warn messages for MDS closes session.\n- ceph: re-send AIO write request when getting -EOLDSNAP error.\n- ceph: re-send flushing caps (which are revoked) in reconnect stage.\n- ceph: re-send requests when MDS enters reconnecting stage.\n- ceph: refactor readpage_nounlock() to make the logic clearer.\n- ceph: remember subtree root dirfrag\u0027s auth MDS.\n- ceph: remove exported caps when handling cap import message.\n- ceph: remove outdated frag information.\n- ceph: remove redundant code for max file size verification.\n- ceph: remove redundant declaration.\n- ceph: remove redundant memset(0).\n- ceph: remove redundant test of head-\u003esafe and silence static analysis warnings.\n- ceph: remove the useless judgement.\n- ceph: remove unused functions in ceph_frag.h.\n- ceph: remove unused stringification macros.\n- ceph: remove useless ACL check.\n- ceph: remove xattr when null value is given to setxattr().\n- ceph: rename snapshot support.\n- ceph: replace comma with a semicolon.\n- ceph: request xattrs if xattr_version is zero.\n- ceph: reserve caps for file layout/lock MDS requests.\n- ceph: reset r_resend_mds after receiving -ESTALE.\n- ceph: return error for traceless reply race.\n- ceph: rework dcache readdir.\n- ceph: send TID of the oldest pending caps flush to MDS.\n- ceph: send client metadata to MDS.\n- ceph: set caps count after composing cap reconnect message.\n- ceph: set i_head_snapc when getting CEPH_CAP_FILE_WR reference.\n- ceph: set mds_wanted when MDS reply changes a cap to auth cap.\n- ceph: show nocephx_require_signatures and notcp_nodelay options.\n- ceph: show non-default options only.\n- ceph: simplify ceph_fh_to_dentry().\n- ceph: simplify two mount_timeout sites.\n- ceph: skip invalid dentry during dcache readdir.\n- ceph: support inline data feature.\n- ceph: switch some GFP_NOFS memory allocation to GFP_KERNEL.\n- ceph: sync read inline data.\n- ceph: take snap_rwsem when accessing snap realm\u0027s cached_context.\n- ceph: tolerate bad i_size for symlink inode (bsc#985232).\n- ceph: track pending caps flushing accurately.\n- ceph: track pending caps flushing globally.\n- ceph: trim unused inodes before reconnecting to recovering MDS.\n- ceph: trivial comment fix.\n- ceph: update i_max_size even if inode version does not change.\n- ceph: update inode fields according to issued caps.\n- ceph: use %zu for len in ceph_fill_inline_data().\n- ceph: use ceph_seq_cmp() to compare migrate_seq.\n- ceph: use empty snap context for uninline_data and get_pool_perm.\n- ceph: use fl-\u003efl_file as owner identifier of flock and posix lock.\n- ceph: use fl-\u003efl_type to decide flock operation.\n- ceph: use fpos_cmp() to compare dentry positions.\n- ceph: use getattr request to fetch inline data.\n- ceph: use i_size_{read,write} to get/set i_size.\n- ceph: use msecs_to_jiffies for time conversion.\n- ceph: use pagelist to present MDS request data.\n- ceph: use truncate_pagecache() instead of truncate_inode_pages().\n- ceph_sync_{,direct_}write: fix an oops on ceph_osdc_new_request() failure.\n- client: include kernel version in client metadata.\n- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).\n- crush: add chooseleaf_stable tunable.\n- crush: decode and initialize chooseleaf_stable.\n- crush: ensure bucket id is valid before indexing buckets array.\n- crush: ensure take bucket value is valid.\n- crush: fix crash from invalid \u0027take\u0027 argument.\n- crush: sync up with userspace.\n- crypto: testmgr - allow rfc3686 aes-ctr variants in fips mode (bsc#958390).\n- crypto: testmgr - mark authenticated ctr(aes) also as FIPS able (bsc#958390).\n- drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904).\n- drm/mgag200: Add support for a new rev of G200e (bsc#983904).\n- drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904).\n- drm/mgag200: remove unused variables (bsc#983904).\n- drm: qxl: Workaround for buggy user-space (bsc#981344).\n- efifb: Add support for 64-bit frame buffer addresses (bsc#973499).\n- efifb: Fix 16 color palette entry calculation (bsc#983318).\n- efifb: Fix KABI of screen_info struct (bsc#973499).\n- ehci-pci: enable interrupt on BayTrail (bnc#947337).\n- enic: set netdev-\u003evlan_features (bsc#966245).\n- fs/ceph/debugfs.c: replace seq_printf by seq_puts.\n- fs/ceph: replace pr_warning by pr_warn.\n- hid-elo: kill not flush the work (bnc#982354).\n- hv: util: Pass the channel information during the init call (bnc#978527).\n- hv: utils: Invoke the poll function after handshake (bnc#978527).\n- hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read().\n- iommu/vt-d: Enable QI on all IOMMUs before setting root entry (bsc#975772).\n- ipvs: count pre-established TCP states as active (bsc#970114).\n- kabi/severities: Added raw3270_* PASS to allow IBM LTC changes (bnc#979922, LTC#141736).\n- kabi/severities: Allow changes in zpci_* symbols (bsc#974692)\n- kabi/severities: Whitelist libceph and rbd (bsc#964727).\n- kabi/severities: Whitelist libceph and rbd.\n- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).\n- kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846).\n- kgraft/gfs2: Do not block livepatching in the log daemon for too long.\n- kgraft/xen: Do not block livepatching in the XEN blkif kthread.\n- libceph: Avoid holding the zero page on ceph_msgr_slab_init errors.\n- libceph: Fix ceph_tcp_sendpage()\u0027s more boolean usage.\n- libceph: MOSDOpReply v7 encoding.\n- libceph: Remove spurious kunmap() of the zero page.\n- libceph: a couple tweaks for wait loops.\n- libceph: add nocephx_sign_messages option.\n- libceph: advertise support for TUNABLES5.\n- libceph: advertise support for keepalive2.\n- libceph: allow setting osd_req_op\u0027s flags.\n- libceph: check data_len in -\u003ealloc_msg().\n- libceph: clear messenger auth_retry flag if we fault.\n- libceph: clear msg-\u003econ in ceph_msg_release() only.\n- libceph: do not access invalid memory in keepalive2 path.\n- libceph: do not spam dmesg with stray reply warnings.\n- libceph: drop authorizer check from cephx msg signing routines.\n- libceph: evaluate osd_req_op_data() arguments only once.\n- libceph: fix authorizer invalidation, take 2.\n- libceph: fix ceph_msg_revoke().\n- libceph: fix wrong name \u0027Ceph filesystem for Linux\u0027.\n- libceph: handle writefull for OSD op extent init (bsc#980706).\n- libceph: introduce ceph_x_authorizer_cleanup().\n- libceph: invalidate AUTH in addition to a service ticket.\n- libceph: kill off ceph_x_ticket_handler::validity.\n- libceph: move ceph_file_layout helpers to ceph_fs.h.\n- libceph: msg signing callouts do not need con argument.\n- libceph: nuke time_sub().\n- libceph: properly release STAT request\u0027s raw_data_in.\n- libceph: remove con argument in handle_reply().\n- libceph: remove outdated comment.\n- libceph: remove the unused macro AES_KEY_SIZE.\n- libceph: rename con_work() to ceph_con_workfn().\n- libceph: set \u0027exists\u0027 flag for newly up osd.\n- libceph: stop duplicating client fields in messenger.\n- libceph: store timeouts in jiffies, verify user input.\n- libceph: treat sockaddr_storage with uninitialized family as blank.\n- libceph: use keepalive2 to verify the mon session is alive.\n- libceph: use list_for_each_entry_safe.\n- libceph: use list_next_entry instead of list_entry_next.\n- libceph: use local variable cursor instead of msg-\u003ecursor.\n- libceph: use the right footer size when skipping a message.\n- libfc: replace \u0027rp_mutex\u0027 with \u0027rp_lock\u0027 (bsc#953233, bsc#962846).\n- md/raid56: Do not perform reads to support writes until stripe is ready.\n- md/raid5: Ensure a batch member is not handled prematurely (bsc#953048).\n- md/raid5: For stripe with R5_ReadNoMerge, we replace REQ_FLUSH with REQ_NOMERGE.\n- md/raid5: add handle_flags arg to break_stripe_batch_list (bsc#953048).\n- md/raid5: allow the stripe_cache to grow and shrink (bsc#953048).\n- md/raid5: always set conf-\u003eprev_chunk_sectors and -\u003eprev_algo (bsc#953048).\n- md/raid5: avoid races when changing cache size (bsc#953048).\n- md/raid5: avoid reading parity blocks for full-stripe write to degraded array (bsc#953048).\n- md/raid5: be more selective about distributing flags across batch (bsc#953048).\n- md/raid5: break stripe-batches when the array has failed (bsc#953048).\n- md/raid5: call break_stripe_batch_list from handle_stripe_clean_event (bsc#953048).\n- md/raid5: change -\u003e\u003einactive_blocked to a bit-flag (bsc#953048).\n- md/raid5: clear R5_NeedReplace when no longer needed (bsc#953048).\n- md/raid5: close race between STRIPE_BIT_DELAY and batching (bsc#953048).\n- md/raid5: close recently introduced race in stripe_head management.\n- md/raid5: consider updating reshape_position at start of reshape (bsc#953048).\n- md/raid5: deadlock between retry_aligned_read with barrier io (bsc#953048).\n- md/raid5: do not do chunk aligned read on degraded array (bsc#953048).\n- md/raid5: do not index beyond end of array in need_this_block() (bsc#953048).\n- md/raid5: do not let shrink_slab shrink too far (bsc#953048).\n- md/raid5: duplicate some more handle_stripe_clean_event code in break_stripe_batch_list (bsc#953048).\n- md/raid5: ensure device failure recorded before write request returns (bsc#953048).\n- md/raid5: ensure whole batch is delayed for all required bitmap updates (bsc#953048).\n- md/raid5: fix allocation of \u0027scribble\u0027 array (bsc#953048).\n- md/raid5: fix another livelock caused by non-aligned writes (bsc#953048).\n- md/raid5: fix handling of degraded stripes in batches (bsc#953048).\n- md/raid5: fix init_stripe() inconsistencies (bsc#953048).\n- md/raid5: fix locking in handle_stripe_clean_event() (bsc#953048).\n- md/raid5: fix newly-broken locking in get_active_stripe.\n- md/raid5: handle possible race as reshape completes (bsc#953048).\n- md/raid5: ignore released_stripes check (bsc#953048).\n- md/raid5: more incorrect BUG_ON in handle_stripe_fill (bsc#953048).\n- md/raid5: move max_nr_stripes management into grow_one_stripe and drop_one_stripe (bsc#953048).\n- md/raid5: need_this_block: start simplifying the last two conditions (bsc#953048).\n- md/raid5: need_this_block: tidy/fix last condition (bsc#953048).\n- md/raid5: new alloc_stripe() to allocate an initialize a stripe (bsc#953048).\n- md/raid5: pass gfp_t arg to grow_one_stripe() (bsc#953048).\n- md/raid5: per hash value and exclusive wait_for_stripe (bsc#953048).\n- md/raid5: preserve STRIPE_PREREAD_ACTIVE in break_stripe_batch_list.\n- md/raid5: remove condition test from check_break_stripe_batch_list (bsc#953048).\n- md/raid5: remove incorrect \u0027min_t()\u0027 when calculating writepos (bsc#953048).\n- md/raid5: remove redundant check in stripe_add_to_batch_list() (bsc#953048).\n- md/raid5: separate large if clause out of fetch_block() (bsc#953048).\n- md/raid5: separate out the easy conditions in need_this_block (bsc#953048).\n- md/raid5: split wait_for_stripe and introduce wait_for_quiescent (bsc#953048).\n- md/raid5: strengthen check on reshape_position at run (bsc#953048).\n- md/raid5: switch to use conf-\u003echunk_sectors in place of mddev-\u003echunk_sectors where possible (bsc#953048).\n- md/raid5: use -\u003elock to protect accessing raid5 sysfs attributes (bsc#953048).\n- md/raid5: use bio_list for the list of bios to return (bsc#953048).\n- md: be careful when testing resync_max against curr_resync_completed (bsc#953048).\n- md: do_release_stripe(): No need to call md_wakeup_thread() twice (bsc#953048).\n- md: make sure MD_RECOVERY_DONE is clear before starting recovery/resync (bsc#953048).\n- md: remove unwanted white space from md.c (bsc#953048).\n- md: use set_bit/clear_bit instead of shift/mask for bi_flags changes (bsc#953048).\n- mds: check cap ID when handling cap export message.\n- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).\n- mmc: sdhci: Allow for irq being shared (bnc#977582).\n- mpt3sas: Fix use sas_is_tlr_enabled API before enabling MPI2_SCSIIO_CONTROL_TLR_ON flag (bsc#967640).\n- net/qlge: Avoids recursive EEH error (bsc#954847).\n- net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667).\n- net: Start with correct mac_len in skb_network_protocol (bsc#968667).\n- net: disable fragment reassembly if high_thresh is set to zero (bsc#970506).\n- net: fix wrong mac_len calculation for vlans (bsc#968667).\n- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).\n- netfilter: bridge: do not leak skb in error paths (bsc#982544).\n- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).\n- nvme: do not poll the CQ from the kthread (bsc#975788, bsc#965087).\n- nvme: fix max_segments integer truncation (bsc#676471).\n- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).\n- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).\n- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).\n- perf/rapl: Fix sysfs_show() initialization for RAPL PMU (bsc#979489).\n- perf/x86/intel: Add Intel RAPL PP1 energy counter support (bsc#979489).\n- powerpc/book3s64: Fix branching to OOL handlers in relocatable kernel (bsc@976821).\n- powerpc/book3s64: Remove __end_handlers marker (bsc#976821).\n- qeth: delete napi struct when removing a qeth device (bnc#988215, LTC#143590).\n- raid5: Retry R5_ReadNoMerge flag when hit a read error.\n- raid5: add a new flag to track if a stripe can be batched (bsc#953048).\n- raid5: add an option to avoid copy data from bio to stripe cache (bsc#953048).\n- raid5: avoid release list until last reference of the stripe (bsc#953048).\n- raid5: batch adjacent full stripe write (bsc#953048).\n- raid5: check faulty flag for array status during recovery (bsc#953048).\n- raid5: check_reshape() shouldn\u0027t call mddev_suspend (bsc#953048).\n- raid5: fix a race of stripe count check.\n- raid5: fix broken async operation chain (bsc#953048).\n- raid5: get_active_stripe avoids device_lock.\n- raid5: handle expansion/resync case with stripe batching (bsc#953048).\n- raid5: handle io error of batch list (bsc#953048).\n- raid5: make_request does less prepare wait.\n- raid5: relieve lock contention in get_active_stripe().\n- raid5: relieve lock contention in get_active_stripe().\n- raid5: revert e9e4c377e2f563 to fix a livelock (bsc#953048).\n- raid5: speedup sync_request processing (bsc#953048).\n- raid5: track overwrite disk count (bsc#953048).\n- raid5: update analysis state for failed stripe (bsc#953048).\n- raid5: use flex_array for scribble data (bsc#953048).\n- rbd: bump queue_max_segments.\n- rbd: delete an unnecessary check before rbd_dev_destroy().\n- rbd: do not free rbd_dev outside of the release callback.\n- rbd: do not put snap_context twice in rbd_queue_workfn().\n- rbd: drop null test before destroy functions.\n- rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394).\n- rbd: plug rbd_dev-\u003eheader.object_prefix memory leak.\n- rbd: rbd_wq comment is obsolete.\n- rbd: remove duplicate calls to rbd_dev_mapping_clear().\n- rbd: report unsupported features to syslog (bsc#979169).\n- rbd: return -ENOMEM instead of pool id if rbd_dev_create() fails.\n- rbd: set device_type::release instead of device::release.\n- rbd: set max_sectors explicitly.\n- rbd: store rbd_options in rbd_device.\n- rbd: terminate rbd_opts_tokens with Opt_err.\n- rbd: timeout watch teardown on unmap with mount_timeout.\n- rbd: use writefull op for object size writes.\n- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 6c6d86d3cdc26f7746fe4ba2bef8859b5aeb346c.\n- s390/3270: add missing tty_kref_put (bnc#979922, LTC#141736).\n- s390/3270: avoid endless I/O loop with disconnected 3270 terminals (bnc#979922, LTC#141736).\n- s390/3270: fix garbled output on 3270 tty view (bnc#979922, LTC#141736).\n- s390/3270: fix view reference counting (bnc#979922, LTC#141736).\n- s390/3270: handle reconnect of a tty with a different size (bnc#979922, LTC#141736).\n- s390/3270: hangup the 3270 tty after a disconnect (bnc#979922, LTC#141736).\n- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979922, LTC#141456).\n- s390/pci: add extra padding to function measurement block (bnc#974692, LTC#139445).\n- s390/pci: enforce fmb page boundary rule (bnc#974692, LTC#139445).\n- s390/pci: extract software counters from fmb (bnc#974692, LTC#139445).\n- s390/pci: remove pdev pointer from arch data (bnc#974692, LTC#139444).\n- s390/pci_dma: fix DMA table corruption with \u003e 4 TB main memory (bnc#974692, LTC#139401).\n- s390/pci_dma: handle dma table failures (bnc#974692, LTC#139442).\n- s390/pci_dma: improve debugging of errors during dma map (bnc#974692, LTC#139442).\n- s390/pci_dma: unify label of invalid translation table entries (bnc#974692, LTC#139442).\n- s390/spinlock: avoid yield to non existent cpu (bnc#979922, LTC#141106).\n- s390: fix test_fp_ctl inline assembly contraints (bnc#988215, LTC#143138).\n- sb_edac: Fix a typo and a thinko in address handling for Haswell (bsc#979521).\n- sb_edac: Fix support for systems with two home agents per socket (bsc#979521).\n- sb_edac: correctly fetch DIMM width on Ivy Bridge and Haswell (bsc#979521).\n- sb_edac: look harder for DDRIO on Haswell systems (bsc#979521).\n- sb_edac: support for Broadwell -EP and -EX (bsc#979521).\n- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).\n- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).\n- sched/x86: Fix up typo in topology detection (bsc#974165).\n- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).\n- scsi-bnx2fc-handle_scsi_retry_delay\n- scsi-bnx2fc-soft_lockup_when_rmmod\n- scsi: Avoid crashing if device uses DIX but adapter does not support it (bsc#969016).\n- sd: get disk reference in sd_check_events() (bnc#897662).\n- target/rbd: do not put snap_context twice (bsc#981143).\n- target/rbd: do not put snap_context twice (bsc#981143).\n- target/rbd: remove caw_mutex usage (bsc#981143).\n- target/rbd: remove caw_mutex usage (bsc#981143).\n- usb: quirk to stop runtime PM for Intel 7260 (bnc#984456).\n- vgaarb: Add more context to error messages (bsc#976868).\n- wait: introduce wait_event_exclusive_cmd (bsc#953048).\n- x86 EDAC, sb_edac.c: Repair damage introduced when \u0027fixing\u0027 channel address (bsc#979521).\n- x86 EDAC, sb_edac.c: Take account of channel hashing when needed (bsc#979521).\n- x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165).\n- x86/efi: parse_efi_setup() build fix (bsc#979485).\n- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- x86: standardize mmap_rnd() usage (bnc#974308).\n- xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).\n- xfs: fix premature enospc on inode allocation (bsc#984148).\n- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).\n- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-RT-12-SP1-2016-1133", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1937-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1937-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161937-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1937-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" }, { "category": "self", "summary": "SUSE Bug 662458", "url": "https://bugzilla.suse.com/662458" }, { "category": "self", "summary": "SUSE Bug 676471", "url": "https://bugzilla.suse.com/676471" }, { "category": "self", "summary": "SUSE Bug 897662", "url": "https://bugzilla.suse.com/897662" }, { "category": "self", "summary": "SUSE Bug 928547", "url": "https://bugzilla.suse.com/928547" }, { "category": "self", "summary": "SUSE Bug 944309", "url": "https://bugzilla.suse.com/944309" }, { "category": "self", "summary": "SUSE Bug 945345", "url": "https://bugzilla.suse.com/945345" }, { "category": "self", "summary": "SUSE Bug 947337", "url": "https://bugzilla.suse.com/947337" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 951844", "url": "https://bugzilla.suse.com/951844" }, { "category": "self", "summary": "SUSE Bug 953048", "url": "https://bugzilla.suse.com/953048" }, { "category": "self", "summary": "SUSE Bug 953233", "url": "https://bugzilla.suse.com/953233" }, { "category": "self", "summary": "SUSE Bug 954847", "url": "https://bugzilla.suse.com/954847" }, { "category": "self", "summary": "SUSE Bug 956491", "url": "https://bugzilla.suse.com/956491" }, { "category": "self", "summary": "SUSE Bug 957805", "url": "https://bugzilla.suse.com/957805" }, { "category": "self", "summary": "SUSE Bug 957986", "url": "https://bugzilla.suse.com/957986" }, { "category": "self", "summary": "SUSE Bug 957990", "url": "https://bugzilla.suse.com/957990" }, { "category": "self", "summary": "SUSE Bug 958390", "url": "https://bugzilla.suse.com/958390" }, { "category": "self", "summary": "SUSE Bug 958463", "url": "https://bugzilla.suse.com/958463" }, { "category": "self", "summary": "SUSE Bug 960857", "url": "https://bugzilla.suse.com/960857" }, { "category": "self", "summary": "SUSE Bug 962742", "url": "https://bugzilla.suse.com/962742" }, { "category": "self", "summary": "SUSE Bug 962846", "url": "https://bugzilla.suse.com/962846" }, { "category": "self", "summary": "SUSE Bug 963762", "url": "https://bugzilla.suse.com/963762" }, { "category": "self", "summary": "SUSE Bug 964727", "url": "https://bugzilla.suse.com/964727" }, { "category": "self", "summary": "SUSE Bug 965087", "url": "https://bugzilla.suse.com/965087" }, { "category": "self", "summary": "SUSE Bug 966245", "url": "https://bugzilla.suse.com/966245" }, { "category": "self", "summary": "SUSE Bug 967640", "url": "https://bugzilla.suse.com/967640" }, { "category": "self", "summary": "SUSE Bug 968667", "url": "https://bugzilla.suse.com/968667" }, { "category": "self", "summary": "SUSE Bug 969016", "url": "https://bugzilla.suse.com/969016" }, { "category": "self", "summary": "SUSE Bug 970114", "url": "https://bugzilla.suse.com/970114" }, { "category": "self", "summary": "SUSE Bug 970506", "url": "https://bugzilla.suse.com/970506" }, { "category": "self", "summary": "SUSE Bug 970604", "url": "https://bugzilla.suse.com/970604" }, { "category": "self", "summary": "SUSE Bug 970609", "url": "https://bugzilla.suse.com/970609" }, { "category": "self", "summary": "SUSE Bug 970948", "url": "https://bugzilla.suse.com/970948" }, { "category": "self", "summary": "SUSE Bug 971049", "url": "https://bugzilla.suse.com/971049" }, { "category": "self", "summary": "SUSE Bug 971770", "url": "https://bugzilla.suse.com/971770" }, { "category": "self", "summary": "SUSE Bug 971947", "url": "https://bugzilla.suse.com/971947" }, { "category": "self", "summary": "SUSE Bug 972124", "url": "https://bugzilla.suse.com/972124" }, { "category": "self", "summary": "SUSE Bug 972933", "url": "https://bugzilla.suse.com/972933" }, { "category": "self", "summary": "SUSE Bug 973378", "url": "https://bugzilla.suse.com/973378" }, { "category": "self", "summary": "SUSE Bug 973499", "url": "https://bugzilla.suse.com/973499" }, { "category": "self", "summary": "SUSE Bug 973570", "url": "https://bugzilla.suse.com/973570" }, { "category": "self", "summary": "SUSE Bug 974165", "url": "https://bugzilla.suse.com/974165" }, { "category": "self", "summary": "SUSE Bug 974308", "url": "https://bugzilla.suse.com/974308" }, { "category": "self", "summary": "SUSE Bug 974620", "url": "https://bugzilla.suse.com/974620" }, { "category": "self", "summary": "SUSE Bug 974646", "url": "https://bugzilla.suse.com/974646" }, { "category": "self", "summary": "SUSE Bug 974692", "url": "https://bugzilla.suse.com/974692" }, { "category": "self", "summary": "SUSE Bug 975533", "url": "https://bugzilla.suse.com/975533" }, { "category": "self", "summary": "SUSE Bug 975772", "url": "https://bugzilla.suse.com/975772" }, { "category": "self", "summary": "SUSE Bug 975788", "url": "https://bugzilla.suse.com/975788" }, { "category": "self", "summary": "SUSE Bug 976739", "url": "https://bugzilla.suse.com/976739" }, { "category": "self", "summary": "SUSE Bug 976821", "url": "https://bugzilla.suse.com/976821" }, { "category": "self", "summary": "SUSE Bug 976868", "url": "https://bugzilla.suse.com/976868" }, { "category": "self", "summary": "SUSE Bug 977417", "url": "https://bugzilla.suse.com/977417" }, { "category": "self", "summary": "SUSE Bug 977582", "url": "https://bugzilla.suse.com/977582" }, { "category": "self", "summary": "SUSE Bug 977685", "url": "https://bugzilla.suse.com/977685" }, { "category": "self", "summary": "SUSE Bug 978401", "url": "https://bugzilla.suse.com/978401" }, { "category": "self", "summary": "SUSE Bug 978469", "url": "https://bugzilla.suse.com/978469" }, { "category": "self", "summary": "SUSE Bug 978527", "url": "https://bugzilla.suse.com/978527" }, { "category": "self", "summary": "SUSE Bug 978822", "url": "https://bugzilla.suse.com/978822" }, { "category": "self", "summary": "SUSE Bug 979169", "url": "https://bugzilla.suse.com/979169" }, { "category": "self", "summary": "SUSE Bug 979213", "url": "https://bugzilla.suse.com/979213" }, { "category": "self", "summary": "SUSE Bug 979347", "url": "https://bugzilla.suse.com/979347" }, { "category": "self", "summary": "SUSE Bug 979419", "url": "https://bugzilla.suse.com/979419" }, { "category": "self", "summary": "SUSE Bug 979485", "url": "https://bugzilla.suse.com/979485" }, { "category": "self", "summary": "SUSE Bug 979489", "url": "https://bugzilla.suse.com/979489" }, { "category": "self", "summary": "SUSE Bug 979521", "url": "https://bugzilla.suse.com/979521" }, { "category": "self", "summary": "SUSE Bug 979548", "url": "https://bugzilla.suse.com/979548" }, { "category": "self", "summary": "SUSE Bug 979867", "url": "https://bugzilla.suse.com/979867" }, { "category": "self", "summary": "SUSE Bug 979879", "url": "https://bugzilla.suse.com/979879" }, { "category": "self", "summary": "SUSE Bug 979922", "url": "https://bugzilla.suse.com/979922" }, { "category": "self", "summary": "SUSE Bug 980246", "url": "https://bugzilla.suse.com/980246" }, { "category": "self", "summary": "SUSE Bug 980348", "url": "https://bugzilla.suse.com/980348" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 980706", "url": "https://bugzilla.suse.com/980706" }, { "category": "self", "summary": "SUSE Bug 981038", "url": "https://bugzilla.suse.com/981038" }, { "category": "self", "summary": "SUSE Bug 981143", "url": "https://bugzilla.suse.com/981143" }, { "category": "self", "summary": "SUSE Bug 981344", "url": "https://bugzilla.suse.com/981344" }, { "category": "self", "summary": "SUSE Bug 982282", "url": "https://bugzilla.suse.com/982282" }, { "category": "self", "summary": "SUSE Bug 982354", "url": "https://bugzilla.suse.com/982354" }, { "category": "self", "summary": "SUSE Bug 982544", "url": "https://bugzilla.suse.com/982544" }, { "category": "self", "summary": "SUSE Bug 982698", "url": "https://bugzilla.suse.com/982698" }, { "category": "self", "summary": "SUSE Bug 983143", "url": "https://bugzilla.suse.com/983143" }, { "category": "self", "summary": "SUSE Bug 983213", "url": "https://bugzilla.suse.com/983213" }, { "category": "self", "summary": "SUSE Bug 983318", "url": "https://bugzilla.suse.com/983318" }, { "category": "self", "summary": "SUSE Bug 983394", "url": "https://bugzilla.suse.com/983394" }, { "category": "self", "summary": "SUSE Bug 983721", "url": "https://bugzilla.suse.com/983721" }, { "category": "self", "summary": "SUSE Bug 983904", "url": "https://bugzilla.suse.com/983904" }, { "category": "self", "summary": "SUSE Bug 983977", "url": "https://bugzilla.suse.com/983977" }, { "category": "self", "summary": "SUSE Bug 984148", "url": "https://bugzilla.suse.com/984148" }, { "category": "self", "summary": "SUSE Bug 984456", "url": "https://bugzilla.suse.com/984456" }, { "category": "self", "summary": "SUSE Bug 984755", "url": "https://bugzilla.suse.com/984755" }, { "category": "self", "summary": "SUSE Bug 985232", "url": "https://bugzilla.suse.com/985232" }, { "category": "self", "summary": "SUSE Bug 985978", "url": "https://bugzilla.suse.com/985978" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986569", "url": "https://bugzilla.suse.com/986569" }, { "category": "self", "summary": "SUSE Bug 986572", "url": "https://bugzilla.suse.com/986572" }, { "category": "self", "summary": "SUSE Bug 986811", "url": "https://bugzilla.suse.com/986811" }, { "category": "self", "summary": "SUSE Bug 988215", "url": "https://bugzilla.suse.com/988215" }, { "category": "self", "summary": "SUSE Bug 988498", "url": "https://bugzilla.suse.com/988498" }, { "category": "self", "summary": "SUSE Bug 988552", "url": "https://bugzilla.suse.com/988552" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9717 page", "url": "https://www.suse.com/security/cve/CVE-2014-9717/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9904 page", "url": "https://www.suse.com/security/cve/CVE-2014-9904/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7833 page", "url": "https://www.suse.com/security/cve/CVE-2015-7833/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8551 page", "url": "https://www.suse.com/security/cve/CVE-2015-8551/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8552 page", "url": "https://www.suse.com/security/cve/CVE-2015-8552/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8845 page", "url": "https://www.suse.com/security/cve/CVE-2015-8845/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2847 page", "url": "https://www.suse.com/security/cve/CVE-2016-2847/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3672 page", "url": "https://www.suse.com/security/cve/CVE-2016-3672/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3707 page", "url": "https://www.suse.com/security/cve/CVE-2016-3707/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4482 page", "url": "https://www.suse.com/security/cve/CVE-2016-4482/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4805 page", "url": "https://www.suse.com/security/cve/CVE-2016-4805/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5828 page", "url": "https://www.suse.com/security/cve/CVE-2016-5828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-08-02T11:06:46Z", "generator": { "date": "2016-08-02T11:06:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1937-1", "initial_release_date": "2016-08-02T11:06:46Z", "revision_history": [ { "date": "2016-08-02T11:06:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-3.12.61-60.18.1.noarch", "product": { "name": "kernel-devel-rt-3.12.61-60.18.1.noarch", "product_id": "kernel-devel-rt-3.12.61-60.18.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-3.12.61-60.18.1.noarch", "product": { "name": "kernel-source-rt-3.12.61-60.18.1.noarch", "product_id": "kernel-source-rt-3.12.61-60.18.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-compute-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-compute-3.12.61-60.18.1.x86_64", "product_id": "kernel-compute-3.12.61-60.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute-base-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-compute-base-3.12.61-60.18.1.x86_64", "product_id": "kernel-compute-base-3.12.61-60.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute-devel-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-compute-devel-3.12.61-60.18.1.x86_64", "product_id": "kernel-compute-devel-3.12.61-60.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "product_id": "kernel-compute_debug-devel-3.12.61-60.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-rt-3.12.61-60.18.1.x86_64", "product_id": "kernel-rt-3.12.61-60.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-rt-base-3.12.61-60.18.1.x86_64", "product_id": "kernel-rt-base-3.12.61-60.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-rt-devel-3.12.61-60.18.1.x86_64", "product_id": "kernel-rt-devel-3.12.61-60.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "product_id": "kernel-rt_debug-devel-3.12.61-60.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-syms-rt-3.12.61-60.18.1.x86_64", "product_id": "kernel-syms-rt-3.12.61-60.18.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP1", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-compute-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-base-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-compute-base-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-devel-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-compute-devel-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute_debug-devel-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-3.12.61-60.18.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch" }, "product_reference": "kernel-devel-rt-3.12.61-60.18.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-rt-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-rt-base-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-rt-devel-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.12.61-60.18.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch" }, "product_reference": "kernel-source-rt-3.12.61-60.18.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-syms-rt-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9717", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9717" } ], "notes": [ { "category": "general", "text": "fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9717", "url": "https://www.suse.com/security/cve/CVE-2014-9717" }, { "category": "external", "summary": "SUSE Bug 928547 for CVE-2014-9717", "url": "https://bugzilla.suse.com/928547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2014-9717" }, { "cve": "CVE-2014-9904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9904" } ], "notes": [ { "category": "general", "text": "The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9904", "url": "https://www.suse.com/security/cve/CVE-2014-9904" }, { "category": "external", "summary": "SUSE Bug 986811 for CVE-2014-9904", "url": "https://bugzilla.suse.com/986811" }, { "category": "external", "summary": "SUSE Bug 986941 for CVE-2014-9904", "url": "https://bugzilla.suse.com/986941" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2014-9904" }, { "cve": "CVE-2015-7833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7833" } ], "notes": [ { "category": "general", "text": "The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7833", "url": "https://www.suse.com/security/cve/CVE-2015-7833" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7833", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 950998 for CVE-2015-7833", "url": "https://bugzilla.suse.com/950998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2015-7833" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "important" } ], "title": "CVE-2015-8539" }, { "cve": "CVE-2015-8551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8551" } ], "notes": [ { "category": "general", "text": "The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka \"Linux pciback missing sanity checks.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8551", "url": "https://www.suse.com/security/cve/CVE-2015-8551" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8551", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 957990 for CVE-2015-8551", "url": "https://bugzilla.suse.com/957990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2015-8551" }, { "cve": "CVE-2015-8552", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8552" } ], "notes": [ { "category": "general", "text": "The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka \"Linux pciback missing sanity checks.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8552", "url": "https://www.suse.com/security/cve/CVE-2015-8552" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8552", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 957990 for CVE-2015-8552", "url": "https://bugzilla.suse.com/957990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2015-8552" }, { "cve": "CVE-2015-8845", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8845" } ], "notes": [ { "category": "general", "text": "The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel before 4.4.1 on powerpc platforms does not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8845", "url": "https://www.suse.com/security/cve/CVE-2015-8845" }, { "category": "external", "summary": "SUSE Bug 975531 for CVE-2015-8845", "url": "https://bugzilla.suse.com/975531" }, { "category": "external", "summary": "SUSE Bug 975533 for CVE-2015-8845", "url": "https://bugzilla.suse.com/975533" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2015-8845" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-2847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2847" } ], "notes": [ { "category": "general", "text": "fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2847", "url": "https://www.suse.com/security/cve/CVE-2016-2847" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2847", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970948 for CVE-2016-2847", "url": "https://bugzilla.suse.com/970948" }, { "category": "external", "summary": "SUSE Bug 974646 for CVE-2016-2847", "url": "https://bugzilla.suse.com/974646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "low" } ], "title": "CVE-2016-2847" }, { "cve": "CVE-2016-3672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3672" } ], "notes": [ { "category": "general", "text": "The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3672", "url": "https://www.suse.com/security/cve/CVE-2016-3672" }, { "category": "external", "summary": "SUSE Bug 974308 for CVE-2016-3672", "url": "https://bugzilla.suse.com/974308" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "low" } ], "title": "CVE-2016-3672" }, { "cve": "CVE-2016-3707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3707" } ], "notes": [ { "category": "general", "text": "The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3707", "url": "https://www.suse.com/security/cve/CVE-2016-3707" }, { "category": "external", "summary": "SUSE Bug 980246 for CVE-2016-3707", "url": "https://bugzilla.suse.com/980246" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "important" } ], "title": "CVE-2016-3707" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4482", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4482" } ], "notes": [ { "category": "general", "text": "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4482", "url": "https://www.suse.com/security/cve/CVE-2016-4482" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4482", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978401 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978401" }, { "category": "external", "summary": "SUSE Bug 978445 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "low" } ], "title": "CVE-2016-4482" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "low" } ], "title": "CVE-2016-4486" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2016-4565" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4805" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4805", "url": "https://www.suse.com/security/cve/CVE-2016-4805" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 980371 for CVE-2016-4805", "url": "https://bugzilla.suse.com/980371" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "low" } ], "title": "CVE-2016-4805" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2016-5244" }, { "cve": "CVE-2016-5828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5828" } ], "notes": [ { "category": "general", "text": "The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5828", "url": "https://www.suse.com/security/cve/CVE-2016-5828" }, { "category": "external", "summary": "SUSE Bug 986569 for CVE-2016-5828", "url": "https://bugzilla.suse.com/986569" }, { "category": "external", "summary": "SUSE Bug 991065 for CVE-2016-5828", "url": "https://bugzilla.suse.com/991065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2016-5828" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2016-5829" } ] }
suse-su-2016:2105-1
Vulnerability from csaf_suse
Published
2016-08-19 08:48
Modified
2016-08-19 08:48
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.62 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2015-8551: The PCI backend driver in Xen, when running on an x86 system and using Linux as the driver domain, allowed local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka 'Linux pciback missing sanity checks (bnc#957990).
- CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system and using Linux as the driver domain, allowed local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka 'Linux pciback missing sanity checks (bnc#957990).
- CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983143).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bsc#978401).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bsc#979213).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986362).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bsc#986365).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction an exec system call (bsc#986569).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
The following non-security bugs were fixed:
- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).
- Add wait_event_cmd() (bsc#953048).
- Btrfs: be more precise on errors when getting an inode from disk (bsc#981038).
- Btrfs: do not use src fd for printk (bsc#980348).
- Btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).
- Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933).
- Btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844).
- Disable btrfs patch (bsc#981597)
- EDAC, sb_edac: Add support for duplicate device IDs (bsc#979521).
- EDAC, sb_edac: Fix TAD presence check for sbridge_mci_bind_devs() (bsc#979521).
- EDAC, sb_edac: Fix rank lookup on Broadwell (bsc#979521).
- EDAC/sb_edac: Fix computation of channel address (bsc#979521).
- EDAC: Correct channel count limit (bsc#979521).
- EDAC: Remove arbitrary limit on number of channels (bsc#979521).
- EDAC: Use static attribute groups for managing sysfs entries (bsc#979521).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).
- PCI/AER: Clear error status registers during enumeration and restore (bsc#985978).
- RAID5: batch adjacent full stripe write (bsc#953048).
- RAID5: check_reshape() shouldn't call mddev_suspend (bsc#953048).
- RAID5: revert e9e4c377e2f563 to fix a livelock (bsc#953048).
- Restore copying of SKBs with head exceeding page size (bsc#978469).
- SCSI: Increase REPORT_LUNS timeout (bsc#982282).
- USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982698).
- Update patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.
- Update patches.drivers/nvme-0106-init-nvme-queue-before-enabling-irq.patch (bsc#962742). Fix incorrect bugzilla referece.
- VSOCK: Fix lockdep issue (bsc#977417).
- VSOCK: sock_put wasn't safe to call in interrupt context (bsc#977417).
- base: make module_create_drivers_dir race-free (bnc#983977).
- cdc_ncm: workaround for EM7455 'silent' data interface (bnc#988552).
- ceph: tolerate bad i_size for symlink inode (bsc#985232).
- drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904).
- drm/mgag200: Add support for a new rev of G200e (bsc#983904).
- drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904).
- drm/mgag200: remove unused variables (bsc#983904).
- drm: qxl: Workaround for buggy user-space (bsc#981344).
- efifb: Add support for 64-bit frame buffer addresses (bsc#973499).
- efifb: Fix 16 color palette entry calculation (bsc#983318).
- efifb: Fix KABI of screen_info struct (bsc#973499).
- ehci-pci: enable interrupt on BayTrail (bnc#947337).
- enic: set netdev->vlan_features (bsc#966245).
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- hid-elo: kill not flush the work (bnc#982354).
- iommu/vt-d: Enable QI on all IOMMUs before setting root entry (bsc#975772).
- ipvs: count pre-established TCP states as active (bsc#970114).
- kabi/severities: Added raw3270_* PASS to allow IBM LTC changes (bnc#979922, LTC#141736)
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- kvm: Guest does not show the cpu flag nonstop_tsc (bsc#971770)
- md/raid56: Do not perform reads to support writes until stripe is ready.
- md/raid5: Ensure a batch member is not handled prematurely (bsc#953048).
- md/raid5: For stripe with R5_ReadNoMerge, we replace REQ_FLUSH with REQ_NOMERGE.
- md/raid5: add handle_flags arg to break_stripe_batch_list (bsc#953048).
- md/raid5: allow the stripe_cache to grow and shrink (bsc#953048).
- md/raid5: always set conf->prev_chunk_sectors and ->prev_algo (bsc#953048).
- md/raid5: avoid races when changing cache size (bsc#953048).
- md/raid5: avoid reading parity blocks for full-stripe write to degraded array (bsc#953048).
- md/raid5: be more selective about distributing flags across batch (bsc#953048).
- md/raid5: break stripe-batches when the array has failed (bsc#953048).
- md/raid5: call break_stripe_batch_list from handle_stripe_clean_event (bsc#953048).
- md/raid5: change ->inactive_blocked to a bit-flag (bsc#953048).
- md/raid5: clear R5_NeedReplace when no longer needed (bsc#953048).
- md/raid5: close race between STRIPE_BIT_DELAY and batching (bsc#953048).
- md/raid5: close recently introduced race in stripe_head management.
- md/raid5: consider updating reshape_position at start of reshape (bsc#953048).
- md/raid5: deadlock between retry_aligned_read with barrier io (bsc#953048).
- md/raid5: do not do chunk aligned read on degraded array (bsc#953048).
- md/raid5: do not index beyond end of array in need_this_block() (bsc#953048).
- md/raid5: do not let shrink_slab shrink too far (bsc#953048).
- md/raid5: duplicate some more handle_stripe_clean_event code in break_stripe_batch_list (bsc#953048).
- md/raid5: ensure device failure recorded before write request returns (bsc#953048).
- md/raid5: ensure whole batch is delayed for all required bitmap updates (bsc#953048).
- md/raid5: fix allocation of 'scribble' array (bsc#953048).
- md/raid5: fix another livelock caused by non-aligned writes (bsc#953048).
- md/raid5: fix handling of degraded stripes in batches (bsc#953048).
- md/raid5: fix init_stripe() inconsistencies (bsc#953048).
- md/raid5: fix locking in handle_stripe_clean_event() (bsc#953048).
- md/raid5: fix newly-broken locking in get_active_stripe.
- md/raid5: handle possible race as reshape completes (bsc#953048).
- md/raid5: ignore released_stripes check (bsc#953048).
- md/raid5: more incorrect BUG_ON in handle_stripe_fill (bsc#953048).
- md/raid5: move max_nr_stripes management into grow_one_stripe and drop_one_stripe (bsc#953048).
- md/raid5: need_this_block: start simplifying the last two conditions (bsc#953048).
- md/raid5: need_this_block: tidy/fix last condition (bsc#953048).
- md/raid5: new alloc_stripe() to allocate an initialize a stripe (bsc#953048).
- md/raid5: pass gfp_t arg to grow_one_stripe() (bsc#953048).
- md/raid5: per hash value and exclusive wait_for_stripe (bsc#953048).
- md/raid5: preserve STRIPE_PREREAD_ACTIVE in break_stripe_batch_list.
- md/raid5: remove condition test from check_break_stripe_batch_list (bsc#953048).
- md/raid5: remove incorrect 'min_t()' when calculating writepos (bsc#953048).
- md/raid5: remove redundant check in stripe_add_to_batch_list() (bsc#953048).
- md/raid5: separate large if clause out of fetch_block() (bsc#953048).
- md/raid5: separate out the easy conditions in need_this_block (bsc#953048).
- md/raid5: split wait_for_stripe and introduce wait_for_quiescent (bsc#953048).
- md/raid5: strengthen check on reshape_position at run (bsc#953048).
- md/raid5: switch to use conf->chunk_sectors in place of mddev->chunk_sectors where possible (bsc#953048).
- md/raid5: use ->lock to protect accessing raid5 sysfs attributes (bsc#953048).
- md/raid5: use bio_list for the list of bios to return (bsc#953048).
- md: be careful when testing resync_max against curr_resync_completed (bsc#953048).
- md: do_release_stripe(): No need to call md_wakeup_thread() twice (bsc#953048).
- md: make sure MD_RECOVERY_DONE is clear before starting recovery/resync (bsc#953048).
- md: remove unwanted white space from md.c (bsc#953048).
- md: use set_bit/clear_bit instead of shift/mask for bi_flags changes (bsc#953048).
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- net/qlge: Avoids recursive EEH error (bsc#954847).
- net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667).
- net: Start with correct mac_len in skb_network_protocol (bsc#968667).
- net: disable fragment reassembly if high_thresh is set to zero (bsc#970506).
- net: fix wrong mac_len calculation for vlans (bsc#968667).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- nvme: don't poll the CQ from the kthread (bsc#975788, bsc#965087).
- perf/rapl: Fix sysfs_show() initialization for RAPL PMU (bsc#979489).
- perf/x86/intel: Add Intel RAPL PP1 energy counter support (bsc#979489).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- qeth: delete napi struct when removing a qeth device (bnc#988215, LTC#143590).
- raid5: Retry R5_ReadNoMerge flag when hit a read error.
- raid5: add a new flag to track if a stripe can be batched (bsc#953048).
- raid5: add an option to avoid copy data from bio to stripe cache (bsc#953048).
- raid5: avoid release list until last reference of the stripe (bsc#953048).
- raid5: check faulty flag for array status during recovery (bsc#953048).
- raid5: fix a race of stripe count check.
- raid5: fix broken async operation chain (bsc#953048).
- raid5: get_active_stripe avoids device_lock.
- raid5: handle expansion/resync case with stripe batching (bsc#953048).
- raid5: handle io error of batch list (bsc#953048).
- raid5: make_request does less prepare wait.
- raid5: relieve lock contention in get_active_stripe().
- raid5: relieve lock contention in get_active_stripe().
- raid5: speedup sync_request processing (bsc#953048).
- raid5: track overwrite disk count (bsc#953048).
- raid5: update analysis state for failed stripe (bsc#953048).
- raid5: use flex_array for scribble data (bsc#953048).
- s390/3270: add missing tty_kref_put (bnc#979922, LTC#141736).
- s390/3270: avoid endless I/O loop with disconnected 3270 terminals (bnc#979922, LTC#141736).
- s390/3270: fix garbled output on 3270 tty view (bnc#979922, LTC#141736).
- s390/3270: fix view reference counting (bnc#979922, LTC#141736).
- s390/3270: handle reconnect of a tty with a different size (bnc#979922, LTC#141736).
- s390/3270: hangup the 3270 tty after a disconnect (bnc#979922, LTC#141736).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979922, LTC#141456).
- s390/spinlock: avoid yield to non existent cpu (bnc#979922, LTC#141106).
- s390: fix test_fp_ctl inline assembly contraints (bnc#988215, LTC#143138).
- sb_edac: Fix a typo and a thinko in address handling for Haswell (bsc#979521).
- sb_edac: Fix support for systems with two home agents per socket (bsc#979521).
- sb_edac: correctly fetch DIMM width on Ivy Bridge and Haswell (bsc#979521).
- sb_edac: look harder for DDRIO on Haswell systems (bsc#979521).
- sb_edac: support for Broadwell -EP and -EX (bsc#979521).
- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).
- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).
- sched/x86: Fix up typo in topology detection (bsc#974165).
- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).
- target/rbd: do not put snap_context twice (bsc#981143).
- target/rbd: remove caw_mutex usage (bsc#981143).
- usb: quirk to stop runtime PM for Intel 7260 (bnc#984456).
- wait: introduce wait_event_exclusive_cmd (bsc#953048).
- x86 EDAC, sb_edac.c: Repair damage introduced when 'fixing' channel address (bsc#979521).
- x86 EDAC, sb_edac.c: Take account of channel hashing when needed (bsc#979521).
- x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165).
- x86/efi: parse_efi_setup() build fix (bsc#979485).
- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- x86: Removed the free memblock of hibernat keys to avoid memory corruption (bsc#990058).
- x86: standardize mmap_rnd() usage (bnc#974308).
- xfs: fix premature enospc on inode allocation (bsc#984148).
- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).
- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1246,SUSE-SLE-Live-Patching-12-2016-1246,SUSE-SLE-Module-Public-Cloud-12-2016-1246,SUSE-SLE-SDK-12-SP1-2016-1246,SUSE-SLE-SERVER-12-SP1-2016-1246,SUSE-SLE-WE-12-SP1-2016-1246
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.62 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).\n- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).\n- CVE-2015-8551: The PCI backend driver in Xen, when running on an x86 system and using Linux as the driver domain, allowed local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka \u0027Linux pciback missing sanity checks (bnc#957990).\n- CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system and using Linux as the driver domain, allowed local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka \u0027Linux pciback missing sanity checks (bnc#957990).\n- CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983143).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).\n- CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bsc#978401).\n- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bsc#979213).\n- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986362).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bsc#986365).\n- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).\n- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction an exec system call (bsc#986569).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n\nThe following non-security bugs were fixed:\n- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).\n- Add wait_event_cmd() (bsc#953048).\n- Btrfs: be more precise on errors when getting an inode from disk (bsc#981038).\n- Btrfs: do not use src fd for printk (bsc#980348).\n- Btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).\n- Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933).\n- Btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844).\n- Disable btrfs patch (bsc#981597)\n- EDAC, sb_edac: Add support for duplicate device IDs (bsc#979521).\n- EDAC, sb_edac: Fix TAD presence check for sbridge_mci_bind_devs() (bsc#979521).\n- EDAC, sb_edac: Fix rank lookup on Broadwell (bsc#979521).\n- EDAC/sb_edac: Fix computation of channel address (bsc#979521).\n- EDAC: Correct channel count limit (bsc#979521).\n- EDAC: Remove arbitrary limit on number of channels (bsc#979521).\n- EDAC: Use static attribute groups for managing sysfs entries (bsc#979521).\n- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).\n- PCI/AER: Clear error status registers during enumeration and restore (bsc#985978).\n- RAID5: batch adjacent full stripe write (bsc#953048).\n- RAID5: check_reshape() shouldn\u0027t call mddev_suspend (bsc#953048).\n- RAID5: revert e9e4c377e2f563 to fix a livelock (bsc#953048).\n- Restore copying of SKBs with head exceeding page size (bsc#978469).\n- SCSI: Increase REPORT_LUNS timeout (bsc#982282).\n- USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982698).\n- Update patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.\n- Update patches.drivers/nvme-0106-init-nvme-queue-before-enabling-irq.patch (bsc#962742). Fix incorrect bugzilla referece.\n- VSOCK: Fix lockdep issue (bsc#977417).\n- VSOCK: sock_put wasn\u0027t safe to call in interrupt context (bsc#977417).\n- base: make module_create_drivers_dir race-free (bnc#983977).\n- cdc_ncm: workaround for EM7455 \u0027silent\u0027 data interface (bnc#988552).\n- ceph: tolerate bad i_size for symlink inode (bsc#985232).\n- drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904).\n- drm/mgag200: Add support for a new rev of G200e (bsc#983904).\n- drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904).\n- drm/mgag200: remove unused variables (bsc#983904).\n- drm: qxl: Workaround for buggy user-space (bsc#981344).\n- efifb: Add support for 64-bit frame buffer addresses (bsc#973499).\n- efifb: Fix 16 color palette entry calculation (bsc#983318).\n- efifb: Fix KABI of screen_info struct (bsc#973499).\n- ehci-pci: enable interrupt on BayTrail (bnc#947337).\n- enic: set netdev-\u003evlan_features (bsc#966245).\n- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- hid-elo: kill not flush the work (bnc#982354).\n- iommu/vt-d: Enable QI on all IOMMUs before setting root entry (bsc#975772).\n- ipvs: count pre-established TCP states as active (bsc#970114).\n- kabi/severities: Added raw3270_* PASS to allow IBM LTC changes (bnc#979922, LTC#141736)\n- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).\n- kvm: Guest does not show the cpu flag nonstop_tsc (bsc#971770) \n- md/raid56: Do not perform reads to support writes until stripe is ready.\n- md/raid5: Ensure a batch member is not handled prematurely (bsc#953048).\n- md/raid5: For stripe with R5_ReadNoMerge, we replace REQ_FLUSH with REQ_NOMERGE.\n- md/raid5: add handle_flags arg to break_stripe_batch_list (bsc#953048).\n- md/raid5: allow the stripe_cache to grow and shrink (bsc#953048).\n- md/raid5: always set conf-\u003eprev_chunk_sectors and -\u003eprev_algo (bsc#953048).\n- md/raid5: avoid races when changing cache size (bsc#953048).\n- md/raid5: avoid reading parity blocks for full-stripe write to degraded array (bsc#953048).\n- md/raid5: be more selective about distributing flags across batch (bsc#953048).\n- md/raid5: break stripe-batches when the array has failed (bsc#953048).\n- md/raid5: call break_stripe_batch_list from handle_stripe_clean_event (bsc#953048).\n- md/raid5: change -\u003einactive_blocked to a bit-flag (bsc#953048).\n- md/raid5: clear R5_NeedReplace when no longer needed (bsc#953048).\n- md/raid5: close race between STRIPE_BIT_DELAY and batching (bsc#953048).\n- md/raid5: close recently introduced race in stripe_head management.\n- md/raid5: consider updating reshape_position at start of reshape (bsc#953048).\n- md/raid5: deadlock between retry_aligned_read with barrier io (bsc#953048).\n- md/raid5: do not do chunk aligned read on degraded array (bsc#953048).\n- md/raid5: do not index beyond end of array in need_this_block() (bsc#953048).\n- md/raid5: do not let shrink_slab shrink too far (bsc#953048).\n- md/raid5: duplicate some more handle_stripe_clean_event code in break_stripe_batch_list (bsc#953048).\n- md/raid5: ensure device failure recorded before write request returns (bsc#953048).\n- md/raid5: ensure whole batch is delayed for all required bitmap updates (bsc#953048).\n- md/raid5: fix allocation of \u0027scribble\u0027 array (bsc#953048).\n- md/raid5: fix another livelock caused by non-aligned writes (bsc#953048).\n- md/raid5: fix handling of degraded stripes in batches (bsc#953048).\n- md/raid5: fix init_stripe() inconsistencies (bsc#953048).\n- md/raid5: fix locking in handle_stripe_clean_event() (bsc#953048).\n- md/raid5: fix newly-broken locking in get_active_stripe.\n- md/raid5: handle possible race as reshape completes (bsc#953048).\n- md/raid5: ignore released_stripes check (bsc#953048).\n- md/raid5: more incorrect BUG_ON in handle_stripe_fill (bsc#953048).\n- md/raid5: move max_nr_stripes management into grow_one_stripe and drop_one_stripe (bsc#953048).\n- md/raid5: need_this_block: start simplifying the last two conditions (bsc#953048).\n- md/raid5: need_this_block: tidy/fix last condition (bsc#953048).\n- md/raid5: new alloc_stripe() to allocate an initialize a stripe (bsc#953048).\n- md/raid5: pass gfp_t arg to grow_one_stripe() (bsc#953048).\n- md/raid5: per hash value and exclusive wait_for_stripe (bsc#953048).\n- md/raid5: preserve STRIPE_PREREAD_ACTIVE in break_stripe_batch_list.\n- md/raid5: remove condition test from check_break_stripe_batch_list (bsc#953048).\n- md/raid5: remove incorrect \u0027min_t()\u0027 when calculating writepos (bsc#953048).\n- md/raid5: remove redundant check in stripe_add_to_batch_list() (bsc#953048).\n- md/raid5: separate large if clause out of fetch_block() (bsc#953048).\n- md/raid5: separate out the easy conditions in need_this_block (bsc#953048).\n- md/raid5: split wait_for_stripe and introduce wait_for_quiescent (bsc#953048).\n- md/raid5: strengthen check on reshape_position at run (bsc#953048).\n- md/raid5: switch to use conf-\u003echunk_sectors in place of mddev-\u003echunk_sectors where possible (bsc#953048).\n- md/raid5: use -\u003elock to protect accessing raid5 sysfs attributes (bsc#953048).\n- md/raid5: use bio_list for the list of bios to return (bsc#953048).\n- md: be careful when testing resync_max against curr_resync_completed (bsc#953048).\n- md: do_release_stripe(): No need to call md_wakeup_thread() twice (bsc#953048).\n- md: make sure MD_RECOVERY_DONE is clear before starting recovery/resync (bsc#953048).\n- md: remove unwanted white space from md.c (bsc#953048).\n- md: use set_bit/clear_bit instead of shift/mask for bi_flags changes (bsc#953048).\n- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).\n- net/qlge: Avoids recursive EEH error (bsc#954847).\n- net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667).\n- net: Start with correct mac_len in skb_network_protocol (bsc#968667).\n- net: disable fragment reassembly if high_thresh is set to zero (bsc#970506).\n- net: fix wrong mac_len calculation for vlans (bsc#968667).\n- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).\n- netfilter: bridge: do not leak skb in error paths (bsc#982544).\n- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).\n- nvme: don\u0027t poll the CQ from the kthread (bsc#975788, bsc#965087).\n- perf/rapl: Fix sysfs_show() initialization for RAPL PMU (bsc#979489).\n- perf/x86/intel: Add Intel RAPL PP1 energy counter support (bsc#979489).\n- ppp: defer netns reference release for ppp channel (bsc#980371). \n- qeth: delete napi struct when removing a qeth device (bnc#988215, LTC#143590).\n- raid5: Retry R5_ReadNoMerge flag when hit a read error.\n- raid5: add a new flag to track if a stripe can be batched (bsc#953048).\n- raid5: add an option to avoid copy data from bio to stripe cache (bsc#953048).\n- raid5: avoid release list until last reference of the stripe (bsc#953048).\n- raid5: check faulty flag for array status during recovery (bsc#953048).\n- raid5: fix a race of stripe count check.\n- raid5: fix broken async operation chain (bsc#953048).\n- raid5: get_active_stripe avoids device_lock.\n- raid5: handle expansion/resync case with stripe batching (bsc#953048).\n- raid5: handle io error of batch list (bsc#953048).\n- raid5: make_request does less prepare wait.\n- raid5: relieve lock contention in get_active_stripe().\n- raid5: relieve lock contention in get_active_stripe().\n- raid5: speedup sync_request processing (bsc#953048).\n- raid5: track overwrite disk count (bsc#953048).\n- raid5: update analysis state for failed stripe (bsc#953048).\n- raid5: use flex_array for scribble data (bsc#953048).\n- s390/3270: add missing tty_kref_put (bnc#979922, LTC#141736).\n- s390/3270: avoid endless I/O loop with disconnected 3270 terminals (bnc#979922, LTC#141736).\n- s390/3270: fix garbled output on 3270 tty view (bnc#979922, LTC#141736).\n- s390/3270: fix view reference counting (bnc#979922, LTC#141736).\n- s390/3270: handle reconnect of a tty with a different size (bnc#979922, LTC#141736).\n- s390/3270: hangup the 3270 tty after a disconnect (bnc#979922, LTC#141736).\n- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979922, LTC#141456).\n- s390/spinlock: avoid yield to non existent cpu (bnc#979922, LTC#141106).\n- s390: fix test_fp_ctl inline assembly contraints (bnc#988215, LTC#143138).\n- sb_edac: Fix a typo and a thinko in address handling for Haswell (bsc#979521).\n- sb_edac: Fix support for systems with two home agents per socket (bsc#979521).\n- sb_edac: correctly fetch DIMM width on Ivy Bridge and Haswell (bsc#979521).\n- sb_edac: look harder for DDRIO on Haswell systems (bsc#979521).\n- sb_edac: support for Broadwell -EP and -EX (bsc#979521).\n- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).\n- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).\n- sched/x86: Fix up typo in topology detection (bsc#974165).\n- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).\n- target/rbd: do not put snap_context twice (bsc#981143).\n- target/rbd: remove caw_mutex usage (bsc#981143).\n- usb: quirk to stop runtime PM for Intel 7260 (bnc#984456).\n- wait: introduce wait_event_exclusive_cmd (bsc#953048).\n- x86 EDAC, sb_edac.c: Repair damage introduced when \u0027fixing\u0027 channel address (bsc#979521).\n- x86 EDAC, sb_edac.c: Take account of channel hashing when needed (bsc#979521).\n- x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165).\n- x86/efi: parse_efi_setup() build fix (bsc#979485).\n- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- x86: Removed the free memblock of hibernat keys to avoid memory corruption (bsc#990058).\n- x86: standardize mmap_rnd() usage (bnc#974308).\n- xfs: fix premature enospc on inode allocation (bsc#984148).\n- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).\n- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2016-1246,SUSE-SLE-Live-Patching-12-2016-1246,SUSE-SLE-Module-Public-Cloud-12-2016-1246,SUSE-SLE-SDK-12-SP1-2016-1246,SUSE-SLE-SERVER-12-SP1-2016-1246,SUSE-SLE-WE-12-SP1-2016-1246", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2105-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2105-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162105-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2105-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" }, { "category": "self", "summary": "SUSE Bug 947337", "url": "https://bugzilla.suse.com/947337" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 951844", "url": "https://bugzilla.suse.com/951844" }, { "category": "self", "summary": "SUSE Bug 953048", "url": "https://bugzilla.suse.com/953048" }, { "category": "self", "summary": "SUSE Bug 954847", "url": "https://bugzilla.suse.com/954847" }, { "category": "self", "summary": "SUSE Bug 956491", "url": "https://bugzilla.suse.com/956491" }, { "category": "self", "summary": "SUSE Bug 957990", "url": "https://bugzilla.suse.com/957990" }, { "category": "self", "summary": "SUSE Bug 962742", "url": "https://bugzilla.suse.com/962742" }, { "category": "self", "summary": "SUSE Bug 963655", "url": "https://bugzilla.suse.com/963655" }, { "category": "self", "summary": "SUSE Bug 963762", "url": "https://bugzilla.suse.com/963762" }, { "category": "self", "summary": "SUSE Bug 965087", "url": "https://bugzilla.suse.com/965087" }, { "category": "self", "summary": "SUSE Bug 966245", "url": "https://bugzilla.suse.com/966245" }, { "category": "self", "summary": "SUSE Bug 968667", "url": "https://bugzilla.suse.com/968667" }, { "category": "self", "summary": "SUSE Bug 970114", "url": "https://bugzilla.suse.com/970114" }, { "category": "self", "summary": "SUSE Bug 970506", "url": "https://bugzilla.suse.com/970506" }, { "category": "self", "summary": "SUSE Bug 971770", "url": "https://bugzilla.suse.com/971770" }, { "category": "self", "summary": "SUSE Bug 972933", "url": "https://bugzilla.suse.com/972933" }, { "category": "self", "summary": "SUSE Bug 973378", "url": "https://bugzilla.suse.com/973378" }, { "category": "self", "summary": "SUSE Bug 973499", "url": "https://bugzilla.suse.com/973499" }, { "category": "self", "summary": "SUSE Bug 974165", "url": "https://bugzilla.suse.com/974165" }, { "category": "self", "summary": "SUSE Bug 974308", "url": "https://bugzilla.suse.com/974308" }, { "category": "self", "summary": "SUSE Bug 974620", "url": "https://bugzilla.suse.com/974620" }, { "category": "self", "summary": "SUSE Bug 975531", "url": "https://bugzilla.suse.com/975531" }, { "category": "self", "summary": "SUSE Bug 975533", "url": "https://bugzilla.suse.com/975533" }, { "category": "self", "summary": "SUSE Bug 975772", "url": "https://bugzilla.suse.com/975772" }, { "category": "self", "summary": "SUSE Bug 975788", "url": "https://bugzilla.suse.com/975788" }, { "category": "self", "summary": "SUSE Bug 977417", "url": "https://bugzilla.suse.com/977417" }, { "category": "self", "summary": "SUSE Bug 978401", "url": "https://bugzilla.suse.com/978401" }, { "category": "self", "summary": "SUSE Bug 978469", "url": "https://bugzilla.suse.com/978469" }, { "category": "self", "summary": "SUSE Bug 978822", "url": "https://bugzilla.suse.com/978822" }, { "category": "self", "summary": "SUSE Bug 979074", "url": "https://bugzilla.suse.com/979074" }, { "category": "self", "summary": "SUSE Bug 979213", "url": "https://bugzilla.suse.com/979213" }, { "category": "self", "summary": "SUSE Bug 979419", "url": "https://bugzilla.suse.com/979419" }, { "category": "self", "summary": "SUSE Bug 979485", "url": "https://bugzilla.suse.com/979485" }, { "category": "self", "summary": "SUSE Bug 979489", "url": "https://bugzilla.suse.com/979489" }, { "category": "self", "summary": "SUSE Bug 979521", "url": "https://bugzilla.suse.com/979521" }, { "category": "self", "summary": "SUSE Bug 979548", "url": "https://bugzilla.suse.com/979548" }, { "category": "self", "summary": "SUSE Bug 979681", "url": "https://bugzilla.suse.com/979681" }, { "category": "self", "summary": "SUSE Bug 979867", "url": "https://bugzilla.suse.com/979867" }, { "category": "self", "summary": "SUSE Bug 979879", "url": "https://bugzilla.suse.com/979879" }, { "category": "self", "summary": "SUSE Bug 979922", "url": "https://bugzilla.suse.com/979922" }, { "category": "self", "summary": "SUSE Bug 980348", "url": "https://bugzilla.suse.com/980348" }, { "category": "self", "summary": "SUSE Bug 980363", "url": "https://bugzilla.suse.com/980363" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 980856", "url": "https://bugzilla.suse.com/980856" }, { "category": "self", "summary": "SUSE Bug 980883", "url": "https://bugzilla.suse.com/980883" }, { "category": "self", "summary": "SUSE Bug 981038", "url": "https://bugzilla.suse.com/981038" }, { "category": "self", "summary": "SUSE Bug 981143", "url": "https://bugzilla.suse.com/981143" }, { "category": "self", "summary": "SUSE Bug 981344", "url": "https://bugzilla.suse.com/981344" }, { "category": "self", "summary": "SUSE Bug 981597", "url": "https://bugzilla.suse.com/981597" }, { "category": "self", "summary": "SUSE Bug 982282", "url": "https://bugzilla.suse.com/982282" }, { "category": "self", "summary": "SUSE Bug 982354", "url": "https://bugzilla.suse.com/982354" }, { "category": "self", "summary": "SUSE Bug 982544", "url": "https://bugzilla.suse.com/982544" }, { "category": "self", "summary": "SUSE Bug 982698", "url": "https://bugzilla.suse.com/982698" }, { "category": "self", "summary": "SUSE Bug 983143", "url": "https://bugzilla.suse.com/983143" }, { "category": "self", "summary": "SUSE Bug 983213", "url": "https://bugzilla.suse.com/983213" }, { "category": "self", "summary": "SUSE Bug 983318", "url": "https://bugzilla.suse.com/983318" }, { "category": "self", "summary": "SUSE Bug 983721", "url": "https://bugzilla.suse.com/983721" }, { "category": "self", "summary": "SUSE Bug 983904", "url": "https://bugzilla.suse.com/983904" }, { "category": "self", "summary": "SUSE Bug 983977", "url": "https://bugzilla.suse.com/983977" }, { "category": "self", "summary": "SUSE Bug 984148", "url": "https://bugzilla.suse.com/984148" }, { "category": "self", "summary": "SUSE Bug 984456", "url": "https://bugzilla.suse.com/984456" }, { "category": "self", "summary": "SUSE Bug 984755", "url": "https://bugzilla.suse.com/984755" }, { "category": "self", "summary": "SUSE Bug 984764", "url": "https://bugzilla.suse.com/984764" }, { "category": "self", "summary": "SUSE Bug 985232", "url": "https://bugzilla.suse.com/985232" }, { "category": "self", "summary": "SUSE Bug 985978", "url": "https://bugzilla.suse.com/985978" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986569", "url": "https://bugzilla.suse.com/986569" }, { "category": "self", "summary": "SUSE Bug 986572", "url": "https://bugzilla.suse.com/986572" }, { "category": "self", "summary": "SUSE Bug 986573", "url": "https://bugzilla.suse.com/986573" }, { "category": "self", "summary": "SUSE Bug 986811", "url": "https://bugzilla.suse.com/986811" }, { "category": "self", "summary": "SUSE Bug 988215", "url": "https://bugzilla.suse.com/988215" }, { "category": "self", "summary": "SUSE Bug 988498", "url": "https://bugzilla.suse.com/988498" }, { "category": "self", "summary": "SUSE Bug 988552", "url": "https://bugzilla.suse.com/988552" }, { "category": "self", "summary": "SUSE Bug 990058", "url": "https://bugzilla.suse.com/990058" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9904 page", "url": "https://www.suse.com/security/cve/CVE-2014-9904/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7833 page", "url": "https://www.suse.com/security/cve/CVE-2015-7833/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8551 page", "url": "https://www.suse.com/security/cve/CVE-2015-8551/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8552 page", "url": "https://www.suse.com/security/cve/CVE-2015-8552/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8845 page", "url": "https://www.suse.com/security/cve/CVE-2015-8845/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3672 page", "url": "https://www.suse.com/security/cve/CVE-2016-3672/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4482 page", "url": "https://www.suse.com/security/cve/CVE-2016-4482/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4805 page", "url": "https://www.suse.com/security/cve/CVE-2016-4805/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5828 page", "url": "https://www.suse.com/security/cve/CVE-2016-5828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-08-19T08:48:37Z", "generator": { "date": "2016-08-19T08:48:37Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2105-1", "initial_release_date": "2016-08-19T08:48:37Z", "revision_history": [ { "date": "2016-08-19T08:48:37Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.62-60.62.1.noarch", "product": { "name": "kernel-devel-3.12.62-60.62.1.noarch", "product_id": "kernel-devel-3.12.62-60.62.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.62-60.62.1.noarch", "product": { "name": "kernel-macros-3.12.62-60.62.1.noarch", "product_id": "kernel-macros-3.12.62-60.62.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.62-60.62.1.noarch", "product": { "name": "kernel-source-3.12.62-60.62.1.noarch", "product_id": "kernel-source-3.12.62-60.62.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.62-60.62.3.noarch", "product": { "name": "kernel-docs-3.12.62-60.62.3.noarch", "product_id": "kernel-docs-3.12.62-60.62.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.62-60.62.1.ppc64le", "product": { "name": "kernel-obs-build-3.12.62-60.62.1.ppc64le", "product_id": "kernel-obs-build-3.12.62-60.62.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.62-60.62.1.ppc64le", "product": { "name": "kernel-default-3.12.62-60.62.1.ppc64le", "product_id": "kernel-default-3.12.62-60.62.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.62-60.62.1.ppc64le", "product": { "name": "kernel-default-base-3.12.62-60.62.1.ppc64le", "product_id": "kernel-default-base-3.12.62-60.62.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.62-60.62.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.62-60.62.1.ppc64le", "product_id": "kernel-default-devel-3.12.62-60.62.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.62-60.62.1.ppc64le", "product": { "name": "kernel-syms-3.12.62-60.62.1.ppc64le", "product_id": "kernel-syms-3.12.62-60.62.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.62-60.62.1.s390x", "product": { "name": "kernel-obs-build-3.12.62-60.62.1.s390x", "product_id": "kernel-obs-build-3.12.62-60.62.1.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.62-60.62.1.s390x", "product": { "name": "kernel-default-3.12.62-60.62.1.s390x", "product_id": "kernel-default-3.12.62-60.62.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.62-60.62.1.s390x", "product": { "name": "kernel-default-base-3.12.62-60.62.1.s390x", "product_id": "kernel-default-base-3.12.62-60.62.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.62-60.62.1.s390x", "product": { "name": "kernel-default-devel-3.12.62-60.62.1.s390x", "product_id": "kernel-default-devel-3.12.62-60.62.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.62-60.62.1.s390x", "product": { "name": "kernel-default-man-3.12.62-60.62.1.s390x", "product_id": "kernel-default-man-3.12.62-60.62.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.62-60.62.1.s390x", "product": { "name": "kernel-syms-3.12.62-60.62.1.s390x", "product_id": "kernel-syms-3.12.62-60.62.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-default-3.12.62-60.62.1.x86_64", "product_id": "kernel-default-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-default-devel-3.12.62-60.62.1.x86_64", "product_id": "kernel-default-devel-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-default-extra-3.12.62-60.62.1.x86_64", "product_id": "kernel-default-extra-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-syms-3.12.62-60.62.1.x86_64", "product_id": "kernel-syms-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-xen-3.12.62-60.62.1.x86_64", "product_id": "kernel-xen-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.62-60.62.1.x86_64", "product_id": "kernel-xen-devel-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "product": { "name": "kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "product_id": "kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "product": { "name": "kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "product_id": "kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-ec2-3.12.62-60.62.1.x86_64", "product_id": "kernel-ec2-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.62-60.62.1.x86_64", "product_id": "kernel-ec2-devel-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.62-60.62.1.x86_64", "product_id": "kernel-ec2-extra-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-obs-build-3.12.62-60.62.1.x86_64", "product_id": "kernel-obs-build-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-default-base-3.12.62-60.62.1.x86_64", "product_id": "kernel-default-base-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-xen-base-3.12.62-60.62.1.x86_64", "product_id": "kernel-xen-base-3.12.62-60.62.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-devel-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-macros-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-source-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-syms-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-xen-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-ec2-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.62-60.62.3.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch" }, "product_reference": "kernel-docs-3.12.62-60.62.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-obs-build-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-obs-build-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-obs-build-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-default-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-default-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-default-base-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-base-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-default-devel-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-default-man-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-devel-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-macros-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-source-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-syms-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-syms-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-syms-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-xen-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-default-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-default-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-default-base-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-base-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-default-devel-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-default-man-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-devel-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-macros-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-source-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-syms-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-syms-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-syms-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-xen-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9904" } ], "notes": [ { "category": "general", "text": "The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9904", "url": "https://www.suse.com/security/cve/CVE-2014-9904" }, { "category": "external", "summary": "SUSE Bug 986811 for CVE-2014-9904", "url": "https://bugzilla.suse.com/986811" }, { "category": "external", "summary": "SUSE Bug 986941 for CVE-2014-9904", "url": "https://bugzilla.suse.com/986941" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2014-9904" }, { "cve": "CVE-2015-7833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7833" } ], "notes": [ { "category": "general", "text": "The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7833", "url": "https://www.suse.com/security/cve/CVE-2015-7833" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7833", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 950998 for CVE-2015-7833", "url": "https://bugzilla.suse.com/950998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2015-7833" }, { "cve": "CVE-2015-8551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8551" } ], "notes": [ { "category": "general", "text": "The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka \"Linux pciback missing sanity checks.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8551", "url": "https://www.suse.com/security/cve/CVE-2015-8551" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8551", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 957990 for CVE-2015-8551", "url": "https://bugzilla.suse.com/957990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2015-8551" }, { "cve": "CVE-2015-8552", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8552" } ], "notes": [ { "category": "general", "text": "The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka \"Linux pciback missing sanity checks.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8552", "url": "https://www.suse.com/security/cve/CVE-2015-8552" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8552", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 957990 for CVE-2015-8552", "url": "https://bugzilla.suse.com/957990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2015-8552" }, { "cve": "CVE-2015-8845", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8845" } ], "notes": [ { "category": "general", "text": "The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel before 4.4.1 on powerpc platforms does not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8845", "url": "https://www.suse.com/security/cve/CVE-2015-8845" }, { "category": "external", "summary": "SUSE Bug 975531 for CVE-2015-8845", "url": "https://bugzilla.suse.com/975531" }, { "category": "external", "summary": "SUSE Bug 975533 for CVE-2015-8845", "url": "https://bugzilla.suse.com/975533" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2015-8845" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-3672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3672" } ], "notes": [ { "category": "general", "text": "The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3672", "url": "https://www.suse.com/security/cve/CVE-2016-3672" }, { "category": "external", "summary": "SUSE Bug 974308 for CVE-2016-3672", "url": "https://bugzilla.suse.com/974308" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "low" } ], "title": "CVE-2016-3672" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4482", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4482" } ], "notes": [ { "category": "general", "text": "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4482", "url": "https://www.suse.com/security/cve/CVE-2016-4482" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4482", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978401 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978401" }, { "category": "external", "summary": "SUSE Bug 978445 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "low" } ], "title": "CVE-2016-4482" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "low" } ], "title": "CVE-2016-4486" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2016-4565" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4805" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4805", "url": "https://www.suse.com/security/cve/CVE-2016-4805" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 980371 for CVE-2016-4805", "url": "https://bugzilla.suse.com/980371" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "low" } ], "title": "CVE-2016-4805" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2016-5244" }, { "cve": "CVE-2016-5828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5828" } ], "notes": [ { "category": "general", "text": "The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5828", "url": "https://www.suse.com/security/cve/CVE-2016-5828" }, { "category": "external", "summary": "SUSE Bug 986569 for CVE-2016-5828", "url": "https://bugzilla.suse.com/986569" }, { "category": "external", "summary": "SUSE Bug 991065 for CVE-2016-5828", "url": "https://bugzilla.suse.com/991065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2016-5828" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2016-5829" } ] }
suse-su-2016:1596-1
Vulnerability from csaf_suse
Published
2016-06-16 09:08
Modified
2016-06-16 09:08
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 GA kernel was updated to fix one security issue.
The following security bug was fixed:
- CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143).
Patchnames
SUSE-SLE-DESKTOP-12-2016-944,SUSE-SLE-Live-Patching-12-2016-944,SUSE-SLE-Module-Public-Cloud-12-2016-944,SUSE-SLE-SDK-12-2016-944,SUSE-SLE-SERVER-12-2016-944,SUSE-SLE-WE-12-2016-944
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 GA kernel was updated to fix one security issue.\n\nThe following security bug was fixed:\n- CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2016-944,SUSE-SLE-Live-Patching-12-2016-944,SUSE-SLE-Module-Public-Cloud-12-2016-944,SUSE-SLE-SDK-12-2016-944,SUSE-SLE-SERVER-12-2016-944,SUSE-SLE-WE-12-2016-944", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1596-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1596-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161596-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1596-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-June/002119.html" }, { "category": "self", "summary": "SUSE Bug 983143", "url": "https://bugzilla.suse.com/983143" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-06-16T09:08:16Z", "generator": { "date": "2016-06-16T09:08:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1596-1", "initial_release_date": "2016-06-16T09:08:16Z", "revision_history": [ { "date": "2016-06-16T09:08:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.55-52.45.1.noarch", "product": { "name": "kernel-devel-3.12.55-52.45.1.noarch", "product_id": "kernel-devel-3.12.55-52.45.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.55-52.45.1.noarch", "product": { "name": "kernel-macros-3.12.55-52.45.1.noarch", "product_id": "kernel-macros-3.12.55-52.45.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.55-52.45.1.noarch", "product": { "name": "kernel-source-3.12.55-52.45.1.noarch", "product_id": "kernel-source-3.12.55-52.45.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.55-52.45.4.noarch", "product": { "name": "kernel-docs-3.12.55-52.45.4.noarch", "product_id": "kernel-docs-3.12.55-52.45.4.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.55-52.45.1.ppc64le", "product": { "name": "kernel-obs-build-3.12.55-52.45.1.ppc64le", "product_id": "kernel-obs-build-3.12.55-52.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.55-52.45.1.ppc64le", "product": { "name": "kernel-default-3.12.55-52.45.1.ppc64le", "product_id": "kernel-default-3.12.55-52.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.55-52.45.1.ppc64le", "product": { "name": "kernel-default-base-3.12.55-52.45.1.ppc64le", "product_id": "kernel-default-base-3.12.55-52.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.55-52.45.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.55-52.45.1.ppc64le", "product_id": "kernel-default-devel-3.12.55-52.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.55-52.45.1.ppc64le", "product": { "name": "kernel-syms-3.12.55-52.45.1.ppc64le", "product_id": "kernel-syms-3.12.55-52.45.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.55-52.45.1.s390x", "product": { "name": "kernel-obs-build-3.12.55-52.45.1.s390x", "product_id": "kernel-obs-build-3.12.55-52.45.1.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.55-52.45.1.s390x", "product": { "name": "kernel-default-3.12.55-52.45.1.s390x", "product_id": "kernel-default-3.12.55-52.45.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.55-52.45.1.s390x", "product": { "name": "kernel-default-base-3.12.55-52.45.1.s390x", "product_id": "kernel-default-base-3.12.55-52.45.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.55-52.45.1.s390x", "product": { "name": "kernel-default-devel-3.12.55-52.45.1.s390x", "product_id": "kernel-default-devel-3.12.55-52.45.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.55-52.45.1.s390x", "product": { "name": "kernel-default-man-3.12.55-52.45.1.s390x", "product_id": "kernel-default-man-3.12.55-52.45.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.55-52.45.1.s390x", "product": { "name": "kernel-syms-3.12.55-52.45.1.s390x", "product_id": "kernel-syms-3.12.55-52.45.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.55-52.45.1.x86_64", "product": { "name": "kernel-default-3.12.55-52.45.1.x86_64", "product_id": "kernel-default-3.12.55-52.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.55-52.45.1.x86_64", "product": { "name": "kernel-default-devel-3.12.55-52.45.1.x86_64", "product_id": "kernel-default-devel-3.12.55-52.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.55-52.45.1.x86_64", "product": { "name": "kernel-default-extra-3.12.55-52.45.1.x86_64", "product_id": "kernel-default-extra-3.12.55-52.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.55-52.45.1.x86_64", "product": { "name": "kernel-syms-3.12.55-52.45.1.x86_64", "product_id": "kernel-syms-3.12.55-52.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.55-52.45.1.x86_64", "product": { "name": "kernel-xen-3.12.55-52.45.1.x86_64", "product_id": "kernel-xen-3.12.55-52.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.55-52.45.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.55-52.45.1.x86_64", "product_id": "kernel-xen-devel-3.12.55-52.45.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_55-52_45-default-1-3.1.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_45-default-1-3.1.x86_64", "product_id": "kgraft-patch-3_12_55-52_45-default-1-3.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_55-52_45-xen-1-3.1.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_45-xen-1-3.1.x86_64", "product_id": "kgraft-patch-3_12_55-52_45-xen-1-3.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.55-52.45.1.x86_64", "product": { "name": "kernel-ec2-3.12.55-52.45.1.x86_64", "product_id": "kernel-ec2-3.12.55-52.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.55-52.45.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.55-52.45.1.x86_64", "product_id": "kernel-ec2-devel-3.12.55-52.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.55-52.45.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.55-52.45.1.x86_64", "product_id": "kernel-ec2-extra-3.12.55-52.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.55-52.45.1.x86_64", "product": { "name": "kernel-obs-build-3.12.55-52.45.1.x86_64", "product_id": "kernel-obs-build-3.12.55-52.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.55-52.45.1.x86_64", "product": { "name": "kernel-default-base-3.12.55-52.45.1.x86_64", "product_id": "kernel-default-base-3.12.55-52.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.55-52.45.1.x86_64", "product": { "name": "kernel-xen-base-3.12.55-52.45.1.x86_64", "product_id": "kernel-xen-base-3.12.55-52.45.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12", "product_id": "SUSE Linux Enterprise Workstation Extension 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-default-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.55-52.45.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.45.1.noarch" }, "product_reference": "kernel-devel-3.12.55-52.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.55-52.45.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.45.1.noarch" }, "product_reference": "kernel-macros-3.12.55-52.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.55-52.45.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.45.1.noarch" }, "product_reference": "kernel-source-3.12.55-52.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-syms-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-xen-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_45-default-1-3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_45-default-1-3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_45-default-1-3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_45-xen-1-3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_45-xen-1-3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_45-xen-1-3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-ec2-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.55-52.45.4.noarch as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.45.4.noarch" }, "product_reference": "kernel-docs-3.12.55-52.45.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.55-52.45.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.45.1.ppc64le" }, "product_reference": "kernel-obs-build-3.12.55-52.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.55-52.45.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.45.1.s390x" }, "product_reference": "kernel-obs-build-3.12.55-52.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-obs-build-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.55-52.45.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.45.1.ppc64le" }, "product_reference": "kernel-default-3.12.55-52.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.55-52.45.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.45.1.s390x" }, "product_reference": "kernel-default-3.12.55-52.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-default-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.55-52.45.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.45.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.55-52.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.55-52.45.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.45.1.s390x" }, "product_reference": "kernel-default-base-3.12.55-52.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-default-base-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.55-52.45.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.45.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.55-52.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.55-52.45.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.45.1.s390x" }, "product_reference": "kernel-default-devel-3.12.55-52.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.55-52.45.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.45.1.s390x" }, "product_reference": "kernel-default-man-3.12.55-52.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.55-52.45.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.45.1.noarch" }, "product_reference": "kernel-devel-3.12.55-52.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.55-52.45.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.45.1.noarch" }, "product_reference": "kernel-macros-3.12.55-52.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.55-52.45.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.45.1.noarch" }, "product_reference": "kernel-source-3.12.55-52.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.55-52.45.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.45.1.ppc64le" }, "product_reference": "kernel-syms-3.12.55-52.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.55-52.45.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.45.1.s390x" }, "product_reference": "kernel-syms-3.12.55-52.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-syms-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-xen-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.55-52.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.45.1.ppc64le" }, "product_reference": "kernel-default-3.12.55-52.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.55-52.45.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.45.1.s390x" }, "product_reference": "kernel-default-3.12.55-52.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-default-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.55-52.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.45.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.55-52.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.55-52.45.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.45.1.s390x" }, "product_reference": "kernel-default-base-3.12.55-52.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-default-base-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.55-52.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.45.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.55-52.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.55-52.45.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.45.1.s390x" }, "product_reference": "kernel-default-devel-3.12.55-52.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.55-52.45.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.45.1.s390x" }, "product_reference": "kernel-default-man-3.12.55-52.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.55-52.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.45.1.noarch" }, "product_reference": "kernel-devel-3.12.55-52.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.55-52.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.45.1.noarch" }, "product_reference": "kernel-macros-3.12.55-52.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.55-52.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.45.1.noarch" }, "product_reference": "kernel-source-3.12.55-52.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.55-52.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.45.1.ppc64le" }, "product_reference": "kernel-syms-3.12.55-52.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.55-52.45.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.45.1.s390x" }, "product_reference": "kernel-syms-3.12.55-52.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-syms-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-xen-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.55-52.45.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12", "product_id": "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.45.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.55-52.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_45-default-1-3.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_45-xen-1-3.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.45.4.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_45-default-1-3.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_45-xen-1-3.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.45.4.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_45-default-1-3.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_55-52_45-xen-1-3.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.55-52.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.55-52.45.4.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.55-52.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.55-52.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-16T09:08:16Z", "details": "important" } ], "title": "CVE-2016-1583" } ] }
suse-su-2016:1672-1
Vulnerability from csaf_suse
Published
2016-06-24 10:34
Modified
2016-06-24 10:34
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
Notable changes in this kernel:
- It is now possible to mount a NFS export on the exporting host directly.
The following security bugs were fixed:
- CVE-2016-5244: A kernel information leak in rds_inc_info_copy was fixed that could leak kernel stack memory to userspace (bsc#983213).
- CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandles NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-0758: Tags with indefinite length could have corrupted pointers in asn1_find_indefinite_length (bsc#979867).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).
- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).
- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).
- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).
- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).
- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).
- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).
- CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).
- CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).
- CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).
- CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandles the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h (bnc#970504).
- CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).
- CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacked a bulk-out endpoint (bnc#961512).
The following non-security bugs were fixed:
- acpi / PCI: Account for ARI in _PRT lookups (bsc#968566).
- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).
- alsa: hrtimer: Handle start/stop more properly (bsc#973378).
- alsa: oxygen: add Xonar DGX support (bsc#982691).
- alsa: pcm: Fix potential deadlock in OSS emulation (bsc#968018).
- alsa: rawmidi: Fix race at copying and updating the position (bsc#968018).
- alsa: rawmidi: Make snd_rawmidi_transmit() race-free (bsc#968018).
- alsa: seq: Fix double port list deletion (bsc#968018).
- alsa: seq: Fix incorrect sanity check at snd_seq_oss_synth_cleanup() (bsc#968018).
- alsa: seq: Fix leak of pool buffer at concurrent writes (bsc#968018).
- alsa: seq: Fix lockdep warnings due to double mutex locks (bsc#968018).
- alsa: seq: Fix race at closing in virmidi driver (bsc#968018).
- alsa: seq: Fix yet another races among ALSA timer accesses (bsc#968018).
- alsa: timer: Call notifier in the same spinlock (bsc#973378).
- alsa: timer: Code cleanup (bsc#968018).
- alsa: timer: Fix leftover link at closing (bsc#968018).
- alsa: timer: Fix link corruption due to double start or stop (bsc#968018).
- alsa: timer: Fix race between stop and interrupt (bsc#968018).
- alsa: timer: Fix wrong instance passed to slave callbacks (bsc#968018).
- alsa: timer: Protect the whole snd_timer_close() with open race (bsc#973378).
- alsa: timer: Sync timer deletion at closing the system timer (bsc#973378).
- alsa: timer: Use mod_timer() for rearming the system timer (bsc#973378).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).
- dcache: use IS_ROOT to decide where dentry is hashed (bsc#949752).
- Delete patches.drivers/nvme-0165-Split-header-file-into-user-visible-and-kernel-.patch. SLE11-SP4 does not have uapi headers so move everything back to the original header (bnc#981231)
- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).
- enic: set netdev->vlan_features (bsc#966245).
- fcoe: fix reset of fip selection time (bsc#974787).
- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- fs, seqfile: always allow oom killer (bnc#968687).
- fs/seq_file: fallback to vmalloc allocation (bnc#968687).
- fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687).
- hid-elo: kill not flush the work (bnc#982532).
- hpsa: fix issues with multilun devices (bsc#959381).
- hv: Assign correct ->can_queue value in hv_storvsc (bnc#969391)
- ibmvscsi: Remove unsupported host config MAD (bsc#973556).
- Import kabi files from kernel 3.0.101-71
- iommu/vt-d: Improve fault handler error messages (bsc#975772).
- iommu/vt-d: Ratelimit fault handler (bsc#975772).
- ipc,sem: fix use after free on IPC_RMID after a task using same semaphore set exits (bsc#967914).
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- ipv4: fix ineffective source address selection (bsc#980788).
- ipv6: make fib6 serial number per namespace (bsc#965319).
- ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs (bsc#956852).
- ipv6: per netns fib6 walkers (bsc#965319).
- ipv6: per netns FIB garbage collection (bsc#965319).
- ipv6: replace global gc_args with local variable (bsc#965319).
- ipvs: count pre-established TCP states as active (bsc#970114).
- isofs: Revert 'get_rock_ridge_filename(): handle malformed NM entries' This reverts commit cb6ce3ec7a964e56da9ba9cd3c9f0e708b5c3b2c. It should have never landed in the tree (we already have the patch via c63531c60ff that came through CVE branch), but I messed up the merge.
- kabi, fs/seq_file: fallback to vmalloc allocation (bnc#968687).
- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).
- KVM: x86: fix maintenance of guest/host xcr0 state (bsc#961518).
- llist: Add llist_next().
- make vfree() safe to call from interrupt contexts .
- memcg: do not hang on OOM when killed by userspace OOM access to memory reserves (bnc#969571).
- mld, igmp: Fix reserved tailroom calculation (bsc#956852).
- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).
- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).
- mm/vmscan.c: avoid throttling reclaim for loop-back nfsd threads (bsc#956491).
- net/core: dev_mc_sync_multiple calls wrong helper (bsc#971433).
- net/core: __hw_addr_create_ex does not initialize sync_cnt (bsc#971433).
- net/core: __hw_addr_sync_one / _multiple broken (bsc#971433).
- net/core: __hw_addr_unsync_one 'from' address not marked synced (bsc#971433).
- NFS4: treat lock owners as opaque values (bnc#968141).
- NFS: avoid deadlocks with loop-back mounted NFS filesystems (bsc#956491).
- NFS: avoid waiting at all in nfs_release_page when congested (bsc#956491).
- NFSd4: return nfserr_symlink on v4 OPEN of non-regular file (bsc#973237).
- NFSd: do not fail unchecked creates of non-special files (bsc#973237).
- NFS: Do not attempt to decode missing directory entries (bsc#980931).
- nfs: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).
- NFS: reduce access cache shrinker locking (bnc#866130).
- NFS: use smaller allocations for 'struct idmap' (bsc#965923).
- NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595).
- nfsv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).
- nvme: fix max_segments integer truncation (bsc#676471).
- NVMe: Unify controller probe and resume (bsc#979347).
- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).
- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).
- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).
- pciback: check PF instead of VF for PCI_COMMAND_MEMORY (bsc#957990).
- pciback: Save the number of MSI-X entries to be copied later (bsc#957988).
- PCI: Move pci_ari_enabled() to global header (bsc#968566).
- RDMA/ucma: Fix AB-BA deadlock (bsc#963998).
- Restore kabi after lock-owner change (bnc#968141).
- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 855c7ce885fd412ce2a25ccc12a46e565c83f235.
- s390/dasd: prevent incorrect length error under z/VM after PAV changes (bnc#968500, LTC#136670).
- s390/pageattr: Do a single TLB flush for change_page_attr (bsc#940413).
- s390/pci: add extra padding to function measurement block (bnc#968500, LTC#139445).
- s390/pci_dma: fix DMA table corruption with > 4 TB main memory (bnc#968500, LTC#139401).
- s390/pci_dma: handle dma table failures (bnc#968500, LTC#139442).
- s390/pci_dma: improve debugging of errors during dma map (bnc#968500, LTC#139442).
- s390/pci_dma: unify label of invalid translation table entries (bnc#968500, LTC#139442).
- s390/pci: enforce fmb page boundary rule (bnc#968500, LTC#139445).
- s390/pci: extract software counters from fmb (bnc#968500, LTC#139445).
- s390/pci: remove pdev pointer from arch data (bnc#968500, LTC#139444).
- s390/spinlock: avoid yield to non existent cpu (bnc#968500, LTC#141106).
- scsi_dh_alua: Do not block request queue if workqueue is active (bsc#960458).
- SCSI: Increase REPORT_LUNS timeout (bsc#971989).
- SCSI mpt2sas: Rearrange the the code so that the completion queues are initialized prior to sending the request to controller firmware (bsc#967863).
- skb: Add inline helper for getting the skb end offset from head (bsc#956852).
- tcp: avoid order-1 allocations on wifi and tx path (bsc#956852).
- tcp: fix skb_availroom() (bsc#956852).
- Tidy series.conf, p5 Only one last patch which can be moved easily. There are some more x86-related things left at the end but moving them won't be that trivial.
- Update patches.drivers/nvme-0265-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.
- Update patches.fixes/bnx2x-Alloc-4k-fragment-for-each-rx-ring-buffer-elem.patch (bsc#953369 bsc#975358).
- Update PCI VPD size patch to upstream: - PCI: Determine actual VPD size on first access (bsc#971729). - PCI: Update VPD definitions (bsc#971729).
- USB: usbip: fix potential out-of-bounds write (bnc#975945).
- veth: do not modify ip_summed (bsc#969149).
- vgaarb: Add more context to error messages (bsc#976868).
- virtio_scsi: Implement eh_timed_out callback (bsc#936530).
- vmxnet3: set carrier state properly on probe (bsc#972363).
- vmxnet3: set netdev parant device before calling netdev_info (bsc#972363).
- x86, kvm: fix kvm's usage of kernel_fpu_begin/end() (bsc#961518).
- x86, kvm: use kernel_fpu_begin/end() in kvm_load/put_guest_fpu() (bsc#961518).
- xfrm: do not segment UFO packets (bsc#946122).
- xfs: fix sgid inheritance for subdirectories inheriting default acls [V3] (bsc#965860).
- xhci: Workaround to get Intel xHCI reset working more reliably (bnc#898592).
Patchnames
sdksp4-kernel-source-12631,slessp4-kernel-source-12631,slexsp3-kernel-source-12631
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nNotable changes in this kernel:\n- It is now possible to mount a NFS export on the exporting host directly.\n\nThe following security bugs were fixed:\n- CVE-2016-5244: A kernel information leak in rds_inc_info_copy was fixed that could leak kernel stack memory to userspace (bsc#983213).\n- CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143).\n- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandles NM (aka alternate name) entries containing \\0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).\n- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).\n- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n- CVE-2016-0758: Tags with indefinite length could have corrupted pointers in asn1_find_indefinite_length (bsc#979867).\n- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).\n- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).\n- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).\n- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).\n- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).\n- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).\n- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).\n- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).\n- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).\n- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).\n- CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).\n- CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).\n- CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).\n- CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandles the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h (bnc#970504).\n- CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).\n- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).\n- CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacked a bulk-out endpoint (bnc#961512).\n\nThe following non-security bugs were fixed:\n- acpi / PCI: Account for ARI in _PRT lookups (bsc#968566).\n- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).\n- alsa: hrtimer: Handle start/stop more properly (bsc#973378).\n- alsa: oxygen: add Xonar DGX support (bsc#982691).\n- alsa: pcm: Fix potential deadlock in OSS emulation (bsc#968018).\n- alsa: rawmidi: Fix race at copying and updating the position (bsc#968018).\n- alsa: rawmidi: Make snd_rawmidi_transmit() race-free (bsc#968018).\n- alsa: seq: Fix double port list deletion (bsc#968018).\n- alsa: seq: Fix incorrect sanity check at snd_seq_oss_synth_cleanup() (bsc#968018).\n- alsa: seq: Fix leak of pool buffer at concurrent writes (bsc#968018).\n- alsa: seq: Fix lockdep warnings due to double mutex locks (bsc#968018).\n- alsa: seq: Fix race at closing in virmidi driver (bsc#968018).\n- alsa: seq: Fix yet another races among ALSA timer accesses (bsc#968018).\n- alsa: timer: Call notifier in the same spinlock (bsc#973378).\n- alsa: timer: Code cleanup (bsc#968018).\n- alsa: timer: Fix leftover link at closing (bsc#968018).\n- alsa: timer: Fix link corruption due to double start or stop (bsc#968018).\n- alsa: timer: Fix race between stop and interrupt (bsc#968018).\n- alsa: timer: Fix wrong instance passed to slave callbacks (bsc#968018).\n- alsa: timer: Protect the whole snd_timer_close() with open race (bsc#973378).\n- alsa: timer: Sync timer deletion at closing the system timer (bsc#973378).\n- alsa: timer: Use mod_timer() for rearming the system timer (bsc#973378).\n- cgroups: do not attach task to subsystem if migration failed (bnc#979274).\n- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).\n- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).\n- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).\n- dcache: use IS_ROOT to decide where dentry is hashed (bsc#949752).\n- Delete patches.drivers/nvme-0165-Split-header-file-into-user-visible-and-kernel-.patch. SLE11-SP4 does not have uapi headers so move everything back to the original header (bnc#981231)\n- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).\n- enic: set netdev-\u003evlan_features (bsc#966245).\n- fcoe: fix reset of fip selection time (bsc#974787).\n- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)\n- fs, seqfile: always allow oom killer (bnc#968687).\n- fs/seq_file: fallback to vmalloc allocation (bnc#968687).\n- fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687).\n- hid-elo: kill not flush the work (bnc#982532).\n- hpsa: fix issues with multilun devices (bsc#959381).\n- hv: Assign correct -\u003ecan_queue value in hv_storvsc (bnc#969391)\n- ibmvscsi: Remove unsupported host config MAD (bsc#973556).\n- Import kabi files from kernel 3.0.101-71\n- iommu/vt-d: Improve fault handler error messages (bsc#975772).\n- iommu/vt-d: Ratelimit fault handler (bsc#975772).\n- ipc,sem: fix use after free on IPC_RMID after a task using same semaphore set exits (bsc#967914).\n- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).\n- ipv4: fix ineffective source address selection (bsc#980788).\n- ipv6: make fib6 serial number per namespace (bsc#965319).\n- ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs (bsc#956852).\n- ipv6: per netns fib6 walkers (bsc#965319).\n- ipv6: per netns FIB garbage collection (bsc#965319).\n- ipv6: replace global gc_args with local variable (bsc#965319).\n- ipvs: count pre-established TCP states as active (bsc#970114).\n- isofs: Revert \u0027get_rock_ridge_filename(): handle malformed NM entries\u0027 This reverts commit cb6ce3ec7a964e56da9ba9cd3c9f0e708b5c3b2c. It should have never landed in the tree (we already have the patch via c63531c60ff that came through CVE branch), but I messed up the merge.\n- kabi, fs/seq_file: fallback to vmalloc allocation (bnc#968687).\n- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).\n- KVM: x86: fix maintenance of guest/host xcr0 state (bsc#961518).\n- llist: Add llist_next().\n- make vfree() safe to call from interrupt contexts .\n- memcg: do not hang on OOM when killed by userspace OOM access to memory reserves (bnc#969571).\n- mld, igmp: Fix reserved tailroom calculation (bsc#956852).\n- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).\n- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).\n- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).\n- mm/vmscan.c: avoid throttling reclaim for loop-back nfsd threads (bsc#956491).\n- net/core: dev_mc_sync_multiple calls wrong helper (bsc#971433).\n- net/core: __hw_addr_create_ex does not initialize sync_cnt (bsc#971433).\n- net/core: __hw_addr_sync_one / _multiple broken (bsc#971433).\n- net/core: __hw_addr_unsync_one \u0027from\u0027 address not marked synced (bsc#971433).\n- NFS4: treat lock owners as opaque values (bnc#968141).\n- NFS: avoid deadlocks with loop-back mounted NFS filesystems (bsc#956491).\n- NFS: avoid waiting at all in nfs_release_page when congested (bsc#956491).\n- NFSd4: return nfserr_symlink on v4 OPEN of non-regular file (bsc#973237).\n- NFSd: do not fail unchecked creates of non-special files (bsc#973237).\n- NFS: Do not attempt to decode missing directory entries (bsc#980931).\n- nfs: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).\n- NFS: reduce access cache shrinker locking (bnc#866130).\n- NFS: use smaller allocations for \u0027struct idmap\u0027 (bsc#965923).\n- NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595).\n- nfsv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).\n- nvme: fix max_segments integer truncation (bsc#676471).\n- NVMe: Unify controller probe and resume (bsc#979347).\n- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).\n- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).\n- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).\n- pciback: check PF instead of VF for PCI_COMMAND_MEMORY (bsc#957990).\n- pciback: Save the number of MSI-X entries to be copied later (bsc#957988).\n- PCI: Move pci_ari_enabled() to global header (bsc#968566).\n- RDMA/ucma: Fix AB-BA deadlock (bsc#963998).\n- Restore kabi after lock-owner change (bnc#968141).\n- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 855c7ce885fd412ce2a25ccc12a46e565c83f235.\n- s390/dasd: prevent incorrect length error under z/VM after PAV changes (bnc#968500, LTC#136670).\n- s390/pageattr: Do a single TLB flush for change_page_attr (bsc#940413).\n- s390/pci: add extra padding to function measurement block (bnc#968500, LTC#139445).\n- s390/pci_dma: fix DMA table corruption with \u003e 4 TB main memory (bnc#968500, LTC#139401).\n- s390/pci_dma: handle dma table failures (bnc#968500, LTC#139442).\n- s390/pci_dma: improve debugging of errors during dma map (bnc#968500, LTC#139442).\n- s390/pci_dma: unify label of invalid translation table entries (bnc#968500, LTC#139442).\n- s390/pci: enforce fmb page boundary rule (bnc#968500, LTC#139445).\n- s390/pci: extract software counters from fmb (bnc#968500, LTC#139445).\n- s390/pci: remove pdev pointer from arch data (bnc#968500, LTC#139444).\n- s390/spinlock: avoid yield to non existent cpu (bnc#968500, LTC#141106).\n- scsi_dh_alua: Do not block request queue if workqueue is active (bsc#960458).\n- SCSI: Increase REPORT_LUNS timeout (bsc#971989).\n- SCSI mpt2sas: Rearrange the the code so that the completion queues are initialized prior to sending the request to controller firmware (bsc#967863).\n- skb: Add inline helper for getting the skb end offset from head (bsc#956852).\n- tcp: avoid order-1 allocations on wifi and tx path (bsc#956852).\n- tcp: fix skb_availroom() (bsc#956852).\n- Tidy series.conf, p5 Only one last patch which can be moved easily. There are some more x86-related things left at the end but moving them won\u0027t be that trivial.\n- Update patches.drivers/nvme-0265-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.\n- Update patches.fixes/bnx2x-Alloc-4k-fragment-for-each-rx-ring-buffer-elem.patch (bsc#953369 bsc#975358).\n- Update PCI VPD size patch to upstream: - PCI: Determine actual VPD size on first access (bsc#971729). - PCI: Update VPD definitions (bsc#971729).\n- USB: usbip: fix potential out-of-bounds write (bnc#975945).\n- veth: do not modify ip_summed (bsc#969149).\n- vgaarb: Add more context to error messages (bsc#976868).\n- virtio_scsi: Implement eh_timed_out callback (bsc#936530).\n- vmxnet3: set carrier state properly on probe (bsc#972363).\n- vmxnet3: set netdev parant device before calling netdev_info (bsc#972363).\n- x86, kvm: fix kvm\u0027s usage of kernel_fpu_begin/end() (bsc#961518).\n- x86, kvm: use kernel_fpu_begin/end() in kvm_load/put_guest_fpu() (bsc#961518).\n- xfrm: do not segment UFO packets (bsc#946122).\n- xfs: fix sgid inheritance for subdirectories inheriting default acls [V3] (bsc#965860).\n- xhci: Workaround to get Intel xHCI reset working more reliably (bnc#898592).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-source-12631,slessp4-kernel-source-12631,slexsp3-kernel-source-12631", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1672-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1672-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161672-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1672-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" }, { "category": "self", "summary": "SUSE Bug 676471", "url": "https://bugzilla.suse.com/676471" }, { "category": "self", "summary": "SUSE Bug 866130", "url": "https://bugzilla.suse.com/866130" }, { "category": "self", "summary": "SUSE Bug 898592", "url": "https://bugzilla.suse.com/898592" }, { "category": "self", "summary": "SUSE Bug 936530", "url": "https://bugzilla.suse.com/936530" }, { "category": "self", "summary": "SUSE Bug 940413", "url": "https://bugzilla.suse.com/940413" }, { "category": "self", "summary": "SUSE Bug 944309", "url": "https://bugzilla.suse.com/944309" }, { "category": "self", "summary": "SUSE Bug 946122", "url": "https://bugzilla.suse.com/946122" }, { "category": "self", "summary": "SUSE Bug 949752", "url": "https://bugzilla.suse.com/949752" }, { "category": "self", "summary": "SUSE Bug 953369", "url": "https://bugzilla.suse.com/953369" }, { "category": "self", "summary": "SUSE Bug 956491", "url": "https://bugzilla.suse.com/956491" }, { "category": "self", "summary": "SUSE Bug 956852", "url": "https://bugzilla.suse.com/956852" }, { "category": "self", "summary": "SUSE Bug 957986", "url": "https://bugzilla.suse.com/957986" }, { "category": "self", "summary": "SUSE Bug 957988", "url": "https://bugzilla.suse.com/957988" }, { "category": "self", "summary": "SUSE Bug 957990", "url": "https://bugzilla.suse.com/957990" }, { "category": "self", "summary": "SUSE Bug 959381", "url": "https://bugzilla.suse.com/959381" }, { "category": "self", "summary": "SUSE Bug 960458", "url": "https://bugzilla.suse.com/960458" }, { "category": "self", "summary": "SUSE Bug 960857", "url": "https://bugzilla.suse.com/960857" }, { "category": "self", "summary": "SUSE Bug 961512", "url": "https://bugzilla.suse.com/961512" }, { "category": "self", "summary": "SUSE Bug 961518", "url": "https://bugzilla.suse.com/961518" }, { "category": "self", "summary": "SUSE Bug 963762", "url": "https://bugzilla.suse.com/963762" }, { "category": "self", "summary": "SUSE Bug 963998", "url": "https://bugzilla.suse.com/963998" }, { "category": "self", "summary": "SUSE Bug 965319", "url": "https://bugzilla.suse.com/965319" }, { "category": "self", "summary": "SUSE Bug 965860", "url": "https://bugzilla.suse.com/965860" }, { "category": "self", "summary": "SUSE Bug 965923", "url": "https://bugzilla.suse.com/965923" }, { "category": "self", "summary": "SUSE Bug 966245", "url": "https://bugzilla.suse.com/966245" }, { "category": "self", "summary": "SUSE Bug 967863", "url": "https://bugzilla.suse.com/967863" }, { "category": "self", "summary": "SUSE Bug 967914", "url": "https://bugzilla.suse.com/967914" }, { "category": "self", "summary": "SUSE Bug 968010", "url": "https://bugzilla.suse.com/968010" }, { "category": "self", "summary": "SUSE Bug 968018", "url": "https://bugzilla.suse.com/968018" }, { "category": "self", "summary": "SUSE Bug 968141", "url": "https://bugzilla.suse.com/968141" }, { "category": "self", "summary": "SUSE Bug 968500", "url": "https://bugzilla.suse.com/968500" }, { "category": "self", "summary": "SUSE Bug 968566", "url": "https://bugzilla.suse.com/968566" }, { "category": "self", "summary": "SUSE Bug 968670", "url": "https://bugzilla.suse.com/968670" }, { "category": "self", "summary": "SUSE Bug 968687", "url": "https://bugzilla.suse.com/968687" }, { "category": "self", "summary": "SUSE Bug 969149", "url": "https://bugzilla.suse.com/969149" }, { "category": "self", "summary": "SUSE Bug 969391", "url": "https://bugzilla.suse.com/969391" }, { "category": "self", "summary": "SUSE Bug 969571", "url": "https://bugzilla.suse.com/969571" }, { "category": "self", "summary": "SUSE Bug 970114", "url": "https://bugzilla.suse.com/970114" }, { "category": "self", "summary": "SUSE Bug 970504", "url": "https://bugzilla.suse.com/970504" }, { "category": "self", "summary": "SUSE Bug 970892", "url": "https://bugzilla.suse.com/970892" }, { "category": "self", "summary": "SUSE Bug 970909", "url": "https://bugzilla.suse.com/970909" }, { "category": "self", "summary": "SUSE Bug 970911", "url": "https://bugzilla.suse.com/970911" }, { "category": "self", "summary": "SUSE Bug 970948", "url": "https://bugzilla.suse.com/970948" }, { "category": "self", "summary": "SUSE Bug 970956", "url": "https://bugzilla.suse.com/970956" }, { "category": "self", "summary": "SUSE Bug 970958", "url": "https://bugzilla.suse.com/970958" }, { "category": "self", "summary": "SUSE Bug 970970", "url": "https://bugzilla.suse.com/970970" }, { "category": "self", "summary": "SUSE Bug 971124", "url": "https://bugzilla.suse.com/971124" }, { "category": "self", "summary": "SUSE Bug 971125", "url": "https://bugzilla.suse.com/971125" }, { "category": "self", "summary": "SUSE Bug 971126", "url": "https://bugzilla.suse.com/971126" }, { "category": "self", "summary": "SUSE Bug 971360", "url": "https://bugzilla.suse.com/971360" }, { "category": "self", "summary": "SUSE Bug 971433", "url": "https://bugzilla.suse.com/971433" }, { "category": "self", "summary": "SUSE Bug 971446", "url": "https://bugzilla.suse.com/971446" }, { "category": "self", "summary": "SUSE Bug 971729", "url": "https://bugzilla.suse.com/971729" }, { "category": "self", "summary": "SUSE Bug 971944", "url": "https://bugzilla.suse.com/971944" }, { "category": "self", "summary": "SUSE Bug 971947", "url": "https://bugzilla.suse.com/971947" }, { "category": "self", "summary": "SUSE Bug 971989", "url": "https://bugzilla.suse.com/971989" }, { "category": "self", "summary": "SUSE Bug 972363", "url": "https://bugzilla.suse.com/972363" }, { "category": "self", "summary": "SUSE Bug 973237", "url": "https://bugzilla.suse.com/973237" }, { "category": "self", "summary": "SUSE Bug 973378", "url": "https://bugzilla.suse.com/973378" }, { "category": "self", "summary": "SUSE Bug 973556", "url": "https://bugzilla.suse.com/973556" }, { "category": "self", "summary": "SUSE Bug 973570", "url": "https://bugzilla.suse.com/973570" }, { "category": "self", "summary": "SUSE Bug 974646", "url": "https://bugzilla.suse.com/974646" }, { "category": "self", "summary": "SUSE Bug 974787", "url": "https://bugzilla.suse.com/974787" }, { "category": "self", "summary": "SUSE Bug 975358", "url": "https://bugzilla.suse.com/975358" }, { "category": "self", "summary": "SUSE Bug 975772", "url": "https://bugzilla.suse.com/975772" }, { "category": "self", "summary": "SUSE Bug 975945", "url": "https://bugzilla.suse.com/975945" }, { "category": "self", "summary": "SUSE Bug 976739", "url": "https://bugzilla.suse.com/976739" }, { "category": "self", "summary": "SUSE Bug 976868", "url": "https://bugzilla.suse.com/976868" }, { "category": "self", "summary": "SUSE Bug 978401", "url": "https://bugzilla.suse.com/978401" }, { "category": "self", "summary": "SUSE Bug 978821", "url": "https://bugzilla.suse.com/978821" }, { "category": "self", "summary": "SUSE Bug 978822", "url": "https://bugzilla.suse.com/978822" }, { "category": "self", "summary": "SUSE Bug 979213", "url": "https://bugzilla.suse.com/979213" }, { "category": "self", "summary": "SUSE Bug 979274", "url": "https://bugzilla.suse.com/979274" }, { "category": "self", "summary": "SUSE Bug 979347", "url": "https://bugzilla.suse.com/979347" }, { "category": "self", "summary": "SUSE Bug 979419", "url": "https://bugzilla.suse.com/979419" }, { "category": "self", "summary": "SUSE Bug 979548", "url": "https://bugzilla.suse.com/979548" }, { "category": "self", "summary": "SUSE Bug 979595", "url": "https://bugzilla.suse.com/979595" }, { "category": "self", "summary": "SUSE Bug 979867", "url": "https://bugzilla.suse.com/979867" }, { "category": "self", "summary": "SUSE Bug 979879", "url": "https://bugzilla.suse.com/979879" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 980725", "url": "https://bugzilla.suse.com/980725" }, { "category": "self", "summary": "SUSE Bug 980788", "url": "https://bugzilla.suse.com/980788" }, { "category": "self", "summary": "SUSE Bug 980931", "url": "https://bugzilla.suse.com/980931" }, { "category": "self", "summary": "SUSE Bug 981231", "url": "https://bugzilla.suse.com/981231" }, { "category": "self", "summary": "SUSE Bug 981267", "url": "https://bugzilla.suse.com/981267" }, { "category": "self", "summary": "SUSE Bug 982532", "url": "https://bugzilla.suse.com/982532" }, { "category": "self", "summary": "SUSE Bug 982691", "url": "https://bugzilla.suse.com/982691" }, { "category": "self", "summary": "SUSE Bug 983143", "url": "https://bugzilla.suse.com/983143" }, { "category": "self", "summary": "SUSE Bug 983213", "url": "https://bugzilla.suse.com/983213" }, { "category": "self", "summary": "SUSE Bug 984107", "url": "https://bugzilla.suse.com/984107" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7566 page", "url": "https://www.suse.com/security/cve/CVE-2015-7566/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8816 page", "url": "https://www.suse.com/security/cve/CVE-2015-8816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2143 page", "url": "https://www.suse.com/security/cve/CVE-2016-2143/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2184 page", "url": "https://www.suse.com/security/cve/CVE-2016-2184/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2185 page", "url": "https://www.suse.com/security/cve/CVE-2016-2185/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2186 page", "url": "https://www.suse.com/security/cve/CVE-2016-2186/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2187 page", "url": "https://www.suse.com/security/cve/CVE-2016-2187/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2188 page", "url": "https://www.suse.com/security/cve/CVE-2016-2188/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2782 page", "url": "https://www.suse.com/security/cve/CVE-2016-2782/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2847 page", "url": "https://www.suse.com/security/cve/CVE-2016-2847/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3137 page", "url": "https://www.suse.com/security/cve/CVE-2016-3137/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3138 page", "url": "https://www.suse.com/security/cve/CVE-2016-3138/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3139 page", "url": "https://www.suse.com/security/cve/CVE-2016-3139/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3140 page", "url": "https://www.suse.com/security/cve/CVE-2016-3140/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3156 page", "url": "https://www.suse.com/security/cve/CVE-2016-3156/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4482 page", "url": "https://www.suse.com/security/cve/CVE-2016-4482/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4485 page", "url": "https://www.suse.com/security/cve/CVE-2016-4485/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4580 page", "url": "https://www.suse.com/security/cve/CVE-2016-4580/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4805 page", "url": "https://www.suse.com/security/cve/CVE-2016-4805/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4913 page", "url": "https://www.suse.com/security/cve/CVE-2016-4913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-06-24T10:34:15Z", "generator": { "date": "2016-06-24T10:34:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1672-1", "initial_release_date": "2016-06-24T10:34:15Z", "revision_history": [ { "date": "2016-06-24T10:34:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-77.1.i586", "product": { "name": "kernel-default-3.0.101-77.1.i586", "product_id": "kernel-default-3.0.101-77.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-77.1.i586", "product": { "name": "kernel-default-base-3.0.101-77.1.i586", "product_id": "kernel-default-base-3.0.101-77.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-77.1.i586", "product": { "name": "kernel-default-devel-3.0.101-77.1.i586", "product_id": "kernel-default-devel-3.0.101-77.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-77.1.i586", "product": { "name": "kernel-ec2-3.0.101-77.1.i586", "product_id": "kernel-ec2-3.0.101-77.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-77.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-77.1.i586", "product_id": "kernel-ec2-base-3.0.101-77.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-77.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-77.1.i586", "product_id": "kernel-ec2-devel-3.0.101-77.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-77.1.i586", "product": { "name": "kernel-pae-3.0.101-77.1.i586", "product_id": "kernel-pae-3.0.101-77.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-77.1.i586", "product": { "name": "kernel-pae-base-3.0.101-77.1.i586", "product_id": "kernel-pae-base-3.0.101-77.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-77.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-77.1.i586", "product_id": "kernel-pae-devel-3.0.101-77.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-77.1.i586", "product": { "name": "kernel-source-3.0.101-77.1.i586", "product_id": "kernel-source-3.0.101-77.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-77.1.i586", "product": { "name": "kernel-syms-3.0.101-77.1.i586", "product_id": "kernel-syms-3.0.101-77.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-77.1.i586", "product": { "name": "kernel-trace-3.0.101-77.1.i586", "product_id": "kernel-trace-3.0.101-77.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-77.1.i586", "product": { "name": "kernel-trace-base-3.0.101-77.1.i586", "product_id": "kernel-trace-base-3.0.101-77.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-77.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-77.1.i586", "product_id": "kernel-trace-devel-3.0.101-77.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-77.1.i586", "product": { "name": "kernel-xen-3.0.101-77.1.i586", "product_id": "kernel-xen-3.0.101-77.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-77.1.i586", "product": { "name": "kernel-xen-base-3.0.101-77.1.i586", "product_id": "kernel-xen-base-3.0.101-77.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-77.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-77.1.i586", "product_id": "kernel-xen-devel-3.0.101-77.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-77.1.ia64", "product": { "name": "kernel-default-3.0.101-77.1.ia64", "product_id": "kernel-default-3.0.101-77.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-77.1.ia64", "product": { "name": "kernel-default-base-3.0.101-77.1.ia64", "product_id": "kernel-default-base-3.0.101-77.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-77.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-77.1.ia64", "product_id": "kernel-default-devel-3.0.101-77.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-77.1.ia64", "product": { "name": "kernel-source-3.0.101-77.1.ia64", "product_id": "kernel-source-3.0.101-77.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-77.1.ia64", "product": { "name": "kernel-syms-3.0.101-77.1.ia64", "product_id": "kernel-syms-3.0.101-77.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-77.1.ia64", "product": { "name": "kernel-trace-3.0.101-77.1.ia64", "product_id": "kernel-trace-3.0.101-77.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-77.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-77.1.ia64", "product_id": "kernel-trace-base-3.0.101-77.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-77.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-77.1.ia64", "product_id": "kernel-trace-devel-3.0.101-77.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-77.2.noarch", "product": { "name": "kernel-docs-3.0.101-77.2.noarch", "product_id": "kernel-docs-3.0.101-77.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-77.1.ppc64", "product": { "name": "kernel-default-3.0.101-77.1.ppc64", "product_id": "kernel-default-3.0.101-77.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-77.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-77.1.ppc64", "product_id": "kernel-default-base-3.0.101-77.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-77.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-77.1.ppc64", "product_id": "kernel-default-devel-3.0.101-77.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-77.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-77.1.ppc64", "product_id": "kernel-ppc64-3.0.101-77.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-77.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-77.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-77.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-77.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-77.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-77.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-77.1.ppc64", "product": { "name": "kernel-source-3.0.101-77.1.ppc64", "product_id": "kernel-source-3.0.101-77.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-77.1.ppc64", "product": { "name": "kernel-syms-3.0.101-77.1.ppc64", "product_id": "kernel-syms-3.0.101-77.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-77.1.ppc64", "product": { "name": "kernel-trace-3.0.101-77.1.ppc64", "product_id": "kernel-trace-3.0.101-77.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-77.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-77.1.ppc64", "product_id": "kernel-trace-base-3.0.101-77.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-77.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-77.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-77.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-77.1.s390x", "product": { "name": "kernel-default-3.0.101-77.1.s390x", "product_id": "kernel-default-3.0.101-77.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-77.1.s390x", "product": { "name": "kernel-default-base-3.0.101-77.1.s390x", "product_id": "kernel-default-base-3.0.101-77.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-77.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-77.1.s390x", "product_id": "kernel-default-devel-3.0.101-77.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-77.1.s390x", "product": { "name": "kernel-default-man-3.0.101-77.1.s390x", "product_id": "kernel-default-man-3.0.101-77.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-77.1.s390x", "product": { "name": "kernel-source-3.0.101-77.1.s390x", "product_id": "kernel-source-3.0.101-77.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-77.1.s390x", "product": { "name": "kernel-syms-3.0.101-77.1.s390x", "product_id": "kernel-syms-3.0.101-77.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-77.1.s390x", "product": { "name": "kernel-trace-3.0.101-77.1.s390x", "product_id": "kernel-trace-3.0.101-77.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-77.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-77.1.s390x", "product_id": "kernel-trace-base-3.0.101-77.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-77.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-77.1.s390x", "product_id": "kernel-trace-devel-3.0.101-77.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-77.1.x86_64", "product": { "name": "kernel-default-3.0.101-77.1.x86_64", "product_id": "kernel-default-3.0.101-77.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-77.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-77.1.x86_64", "product_id": "kernel-default-base-3.0.101-77.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-77.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-77.1.x86_64", "product_id": "kernel-default-devel-3.0.101-77.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-77.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-77.1.x86_64", "product_id": "kernel-ec2-3.0.101-77.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-77.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-77.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-77.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-77.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-77.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-77.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-77.1.x86_64", "product": { "name": "kernel-source-3.0.101-77.1.x86_64", "product_id": "kernel-source-3.0.101-77.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-77.1.x86_64", "product": { "name": "kernel-syms-3.0.101-77.1.x86_64", "product_id": "kernel-syms-3.0.101-77.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-77.1.x86_64", "product": { "name": "kernel-trace-3.0.101-77.1.x86_64", "product_id": "kernel-trace-3.0.101-77.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-77.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-77.1.x86_64", "product_id": "kernel-trace-base-3.0.101-77.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-77.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-77.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-77.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-77.1.x86_64", "product": { "name": "kernel-xen-3.0.101-77.1.x86_64", "product_id": "kernel-xen-3.0.101-77.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-77.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-77.1.x86_64", "product_id": "kernel-xen-base-3.0.101-77.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-77.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-77.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-77.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-77.2.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" }, "product_reference": "kernel-docs-3.0.101-77.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586" }, "product_reference": "kernel-default-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-77.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64" }, "product_reference": "kernel-default-3.0.101-77.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64" }, "product_reference": "kernel-default-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x" }, "product_reference": "kernel-default-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64" }, "product_reference": "kernel-default-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586" }, "product_reference": "kernel-default-base-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-77.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-77.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-77.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-77.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586" }, "product_reference": "kernel-ec2-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586" }, "product_reference": "kernel-pae-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586" }, "product_reference": "kernel-source-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-77.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64" }, "product_reference": "kernel-source-3.0.101-77.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64" }, "product_reference": "kernel-source-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x" }, "product_reference": "kernel-source-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64" }, "product_reference": "kernel-source-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586" }, "product_reference": "kernel-syms-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-77.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64" }, "product_reference": "kernel-syms-3.0.101-77.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x" }, "product_reference": "kernel-syms-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586" }, "product_reference": "kernel-trace-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-77.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64" }, "product_reference": "kernel-trace-3.0.101-77.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x" }, "product_reference": "kernel-trace-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-77.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-77.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-77.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-77.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586" }, "product_reference": "kernel-xen-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586" }, "product_reference": "kernel-default-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-77.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64" }, "product_reference": "kernel-default-3.0.101-77.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64" }, "product_reference": "kernel-default-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x" }, "product_reference": "kernel-default-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64" }, "product_reference": "kernel-default-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586" }, "product_reference": "kernel-default-base-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-77.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-77.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-77.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-77.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586" }, "product_reference": "kernel-ec2-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586" }, "product_reference": "kernel-pae-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586" }, "product_reference": "kernel-source-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-77.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64" }, "product_reference": "kernel-source-3.0.101-77.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64" }, "product_reference": "kernel-source-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x" }, "product_reference": "kernel-source-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64" }, "product_reference": "kernel-source-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586" }, "product_reference": "kernel-syms-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-77.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64" }, "product_reference": "kernel-syms-3.0.101-77.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x" }, "product_reference": "kernel-syms-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586" }, "product_reference": "kernel-trace-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-77.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64" }, "product_reference": "kernel-trace-3.0.101-77.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x" }, "product_reference": "kernel-trace-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-77.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-77.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-77.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-77.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-77.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-77.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-77.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586" }, "product_reference": "kernel-xen-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-77.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-77.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7566" } ], "notes": [ { "category": "general", "text": "The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel through 4.4.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7566", "url": "https://www.suse.com/security/cve/CVE-2015-7566" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7566", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 961512 for CVE-2015-7566", "url": "https://bugzilla.suse.com/961512" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2015-7566" }, { "cve": "CVE-2015-8816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8816" } ], "notes": [ { "category": "general", "text": "The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8816", "url": "https://www.suse.com/security/cve/CVE-2015-8816" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8816", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968010 for CVE-2015-8816", "url": "https://bugzilla.suse.com/968010" }, { "category": "external", "summary": "SUSE Bug 979064 for CVE-2015-8816", "url": "https://bugzilla.suse.com/979064" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2015-8816" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-2143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2143" } ], "notes": [ { "category": "general", "text": "The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2143", "url": "https://www.suse.com/security/cve/CVE-2016-2143" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-2143", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 970504 for CVE-2016-2143", "url": "https://bugzilla.suse.com/970504" }, { "category": "external", "summary": "SUSE Bug 993872 for CVE-2016-2143", "url": "https://bugzilla.suse.com/993872" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "important" } ], "title": "CVE-2016-2143" }, { "cve": "CVE-2016-2184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2184" } ], "notes": [ { "category": "general", "text": "The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2184", "url": "https://www.suse.com/security/cve/CVE-2016-2184" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2184", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971125 for CVE-2016-2184", "url": "https://bugzilla.suse.com/971125" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-2184" }, { "cve": "CVE-2016-2185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2185" } ], "notes": [ { "category": "general", "text": "The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2185", "url": "https://www.suse.com/security/cve/CVE-2016-2185" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2185", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971124 for CVE-2016-2185", "url": "https://bugzilla.suse.com/971124" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-2185" }, { "cve": "CVE-2016-2186", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2186" } ], "notes": [ { "category": "general", "text": "The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2186", "url": "https://www.suse.com/security/cve/CVE-2016-2186" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2186", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970958 for CVE-2016-2186", "url": "https://bugzilla.suse.com/970958" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-2186" }, { "cve": "CVE-2016-2187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2187" } ], "notes": [ { "category": "general", "text": "The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2187", "url": "https://www.suse.com/security/cve/CVE-2016-2187" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2187", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971919 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971919" }, { "category": "external", "summary": "SUSE Bug 971944 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "moderate" } ], "title": "CVE-2016-2187" }, { "cve": "CVE-2016-2188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2188" } ], "notes": [ { "category": "general", "text": "The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2188", "url": "https://www.suse.com/security/cve/CVE-2016-2188" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2188", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1067912 for CVE-2016-2188", "url": "https://bugzilla.suse.com/1067912" }, { "category": "external", "summary": "SUSE Bug 1132190 for CVE-2016-2188", "url": "https://bugzilla.suse.com/1132190" }, { "category": "external", "summary": "SUSE Bug 970956 for CVE-2016-2188", "url": "https://bugzilla.suse.com/970956" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-2188" }, { "cve": "CVE-2016-2782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2782" } ], "notes": [ { "category": "general", "text": "The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2782", "url": "https://www.suse.com/security/cve/CVE-2016-2782" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2782", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 961512 for CVE-2016-2782", "url": "https://bugzilla.suse.com/961512" }, { "category": "external", "summary": "SUSE Bug 968670 for CVE-2016-2782", "url": "https://bugzilla.suse.com/968670" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "moderate" } ], "title": "CVE-2016-2782" }, { "cve": "CVE-2016-2847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2847" } ], "notes": [ { "category": "general", "text": "fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2847", "url": "https://www.suse.com/security/cve/CVE-2016-2847" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2847", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970948 for CVE-2016-2847", "url": "https://bugzilla.suse.com/970948" }, { "category": "external", "summary": "SUSE Bug 974646 for CVE-2016-2847", "url": "https://bugzilla.suse.com/974646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-2847" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-3137", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3137" } ], "notes": [ { "category": "general", "text": "drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3137", "url": "https://www.suse.com/security/cve/CVE-2016-3137" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3137", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970970 for CVE-2016-3137", "url": "https://bugzilla.suse.com/970970" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-3137" }, { "cve": "CVE-2016-3138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3138" } ], "notes": [ { "category": "general", "text": "The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3138", "url": "https://www.suse.com/security/cve/CVE-2016-3138" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3138", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970911 for CVE-2016-3138", "url": "https://bugzilla.suse.com/970911" }, { "category": "external", "summary": "SUSE Bug 970970 for CVE-2016-3138", "url": "https://bugzilla.suse.com/970970" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-3138" }, { "cve": "CVE-2016-3139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3139" } ], "notes": [ { "category": "general", "text": "The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel before 3.17 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3139", "url": "https://www.suse.com/security/cve/CVE-2016-3139" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3139", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970909 for CVE-2016-3139", "url": "https://bugzilla.suse.com/970909" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-3139" }, { "cve": "CVE-2016-3140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3140" } ], "notes": [ { "category": "general", "text": "The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3140", "url": "https://www.suse.com/security/cve/CVE-2016-3140" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3140", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970892 for CVE-2016-3140", "url": "https://bugzilla.suse.com/970892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-3140" }, { "cve": "CVE-2016-3156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3156" } ], "notes": [ { "category": "general", "text": "The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3156", "url": "https://www.suse.com/security/cve/CVE-2016-3156" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3156", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971360 for CVE-2016-3156", "url": "https://bugzilla.suse.com/971360" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-3156" }, { "cve": "CVE-2016-4482", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4482" } ], "notes": [ { "category": "general", "text": "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4482", "url": "https://www.suse.com/security/cve/CVE-2016-4482" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4482", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978401 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978401" }, { "category": "external", "summary": "SUSE Bug 978445 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-4482" }, { "cve": "CVE-2016-4485", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4485" } ], "notes": [ { "category": "general", "text": "The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4485", "url": "https://www.suse.com/security/cve/CVE-2016-4485" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4485", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978821 for CVE-2016-4485", "url": "https://bugzilla.suse.com/978821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "moderate" } ], "title": "CVE-2016-4485" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-4486" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "moderate" } ], "title": "CVE-2016-4565" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4580" } ], "notes": [ { "category": "general", "text": "The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4580", "url": "https://www.suse.com/security/cve/CVE-2016-4580" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4580", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 981267 for CVE-2016-4580", "url": "https://bugzilla.suse.com/981267" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4580", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-4580" }, { "cve": "CVE-2016-4805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4805" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4805", "url": "https://www.suse.com/security/cve/CVE-2016-4805" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 980371 for CVE-2016-4805", "url": "https://bugzilla.suse.com/980371" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "low" } ], "title": "CVE-2016-4805" }, { "cve": "CVE-2016-4913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4913" } ], "notes": [ { "category": "general", "text": "The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \\0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4913", "url": "https://www.suse.com/security/cve/CVE-2016-4913" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4913", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4913", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 980725 for CVE-2016-4913", "url": "https://bugzilla.suse.com/980725" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4913", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "moderate" } ], "title": "CVE-2016-4913" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-77.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-77.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-06-24T10:34:15Z", "details": "moderate" } ], "title": "CVE-2016-5244" } ] }
suse-su-2016:2002-1
Vulnerability from csaf_suse
Published
2016-08-09 11:57
Modified
2016-08-09 11:57
Summary
Security update for Linux Kernel Live Patch 10 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 10 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.51-52_34 fixes several issues.
The following security bugs were fixed:
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bsc#973570, bsc#955837).
Patchnames
SUSE-SLE-SAP-12-2016-1190,SUSE-SLE-SERVER-12-2016-1190
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 10 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-52_34 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).\n- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).\n- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bsc#973570, bsc#955837).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1190,SUSE-SLE-SERVER-12-2016-1190", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2002-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2002-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162002-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2002-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002189.html" }, { "category": "self", "summary": "SUSE Bug 955837", "url": "https://bugzilla.suse.com/955837" }, { "category": "self", "summary": "SUSE Bug 971793", "url": "https://bugzilla.suse.com/971793" }, { "category": "self", "summary": "SUSE Bug 973570", "url": "https://bugzilla.suse.com/973570" }, { "category": "self", "summary": "SUSE Bug 979064", "url": "https://bugzilla.suse.com/979064" }, { "category": "self", "summary": "SUSE Bug 979074", "url": "https://bugzilla.suse.com/979074" }, { "category": "self", "summary": "SUSE Bug 980856", "url": "https://bugzilla.suse.com/980856" }, { "category": "self", "summary": "SUSE Bug 980883", "url": "https://bugzilla.suse.com/980883" }, { "category": "self", "summary": "SUSE Bug 983144", "url": "https://bugzilla.suse.com/983144" }, { "category": "self", "summary": "SUSE Bug 984764", "url": "https://bugzilla.suse.com/984764" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7446 page", "url": "https://www.suse.com/security/cve/CVE-2013-7446/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8816 page", "url": "https://www.suse.com/security/cve/CVE-2015-8816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" } ], "title": "Security update for Linux Kernel Live Patch 10 for SLE 12", "tracking": { "current_release_date": "2016-08-09T11:57:22Z", "generator": { "date": "2016-08-09T11:57:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2002-1", "initial_release_date": "2016-08-09T11:57:22Z", "revision_history": [ { "date": "2016-08-09T11:57:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "product_id": "kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "product_id": "kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7446" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7446", "url": "https://www.suse.com/security/cve/CVE-2013-7446" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-7446", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 955654 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955654" }, { "category": "external", "summary": "SUSE Bug 955837 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:57:22Z", "details": "moderate" } ], "title": "CVE-2013-7446" }, { "cve": "CVE-2015-8816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8816" } ], "notes": [ { "category": "general", "text": "The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8816", "url": "https://www.suse.com/security/cve/CVE-2015-8816" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8816", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968010 for CVE-2015-8816", "url": "https://bugzilla.suse.com/968010" }, { "category": "external", "summary": "SUSE Bug 979064 for CVE-2015-8816", "url": "https://bugzilla.suse.com/979064" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:57:22Z", "details": "low" } ], "title": "CVE-2015-8816" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:57:22Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:57:22Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:57:22Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:57:22Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:57:22Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:57:22Z", "details": "moderate" } ], "title": "CVE-2016-4565" } ] }
suse-su-2016:1994-1
Vulnerability from csaf_suse
Published
2016-08-09 11:25
Modified
2016-08-09 11:25
Summary
Security update for Linux Kernel Live Patch 1 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 1 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.51-60_20 fixes the several issues.
These security issues were fixed:
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).
- CVE-2015-8019: The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel did not accept a length argument, which allowed local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call (bsc#979078).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).
This non-security issue was fixed:
- bsc#973570: The fix for CVE-2013-7446 introduced a bug that could have possibly lead to a softlockup.
Patchnames
SUSE-SLE-Live-Patching-12-2016-1183
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 1 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-60_20 fixes the several issues.\n\nThese security issues were fixed:\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).\n- CVE-2015-8019: The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel did not accept a length argument, which allowed local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call (bsc#979078).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).\n- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).\nThis non-security issue was fixed:\n- bsc#973570: The fix for CVE-2013-7446 introduced a bug that could have possibly lead to a softlockup. \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1183", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1994-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1994-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161994-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1994-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002181.html" }, { "category": "self", "summary": "SUSE Bug 971793", "url": "https://bugzilla.suse.com/971793" }, { "category": "self", "summary": "SUSE Bug 973570", "url": "https://bugzilla.suse.com/973570" }, { "category": "self", "summary": "SUSE Bug 979064", "url": "https://bugzilla.suse.com/979064" }, { "category": "self", "summary": "SUSE Bug 979074", "url": "https://bugzilla.suse.com/979074" }, { "category": "self", "summary": "SUSE Bug 979078", "url": "https://bugzilla.suse.com/979078" }, { "category": "self", "summary": "SUSE Bug 980856", "url": "https://bugzilla.suse.com/980856" }, { "category": "self", "summary": "SUSE Bug 980883", "url": "https://bugzilla.suse.com/980883" }, { "category": "self", "summary": "SUSE Bug 983144", "url": "https://bugzilla.suse.com/983144" }, { "category": "self", "summary": "SUSE Bug 984764", "url": "https://bugzilla.suse.com/984764" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7446 page", "url": "https://www.suse.com/security/cve/CVE-2013-7446/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8019 page", "url": "https://www.suse.com/security/cve/CVE-2015-8019/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8816 page", "url": "https://www.suse.com/security/cve/CVE-2015-8816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" } ], "title": "Security update for Linux Kernel Live Patch 1 for SLE 12 SP1", "tracking": { "current_release_date": "2016-08-09T11:25:53Z", "generator": { "date": "2016-08-09T11:25:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1994-1", "initial_release_date": "2016-08-09T11:25:53Z", "revision_history": [ { "date": "2016-08-09T11:25:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7446" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7446", "url": "https://www.suse.com/security/cve/CVE-2013-7446" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-7446", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 955654 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955654" }, { "category": "external", "summary": "SUSE Bug 955837 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:53Z", "details": "moderate" } ], "title": "CVE-2013-7446" }, { "cve": "CVE-2015-8019", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8019" } ], "notes": [ { "category": "general", "text": "The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel 3.14.54 and 3.18.22 does not accept a length argument, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8019", "url": "https://www.suse.com/security/cve/CVE-2015-8019" }, { "category": "external", "summary": "SUSE Bug 1032268 for CVE-2015-8019", "url": "https://bugzilla.suse.com/1032268" }, { "category": "external", "summary": "SUSE Bug 951199 for CVE-2015-8019", "url": "https://bugzilla.suse.com/951199" }, { "category": "external", "summary": "SUSE Bug 952587 for CVE-2015-8019", "url": "https://bugzilla.suse.com/952587" }, { "category": "external", "summary": "SUSE Bug 979078 for CVE-2015-8019", "url": "https://bugzilla.suse.com/979078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:53Z", "details": "moderate" } ], "title": "CVE-2015-8019" }, { "cve": "CVE-2015-8816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8816" } ], "notes": [ { "category": "general", "text": "The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8816", "url": "https://www.suse.com/security/cve/CVE-2015-8816" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8816", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968010 for CVE-2015-8816", "url": "https://bugzilla.suse.com/968010" }, { "category": "external", "summary": "SUSE Bug 979064 for CVE-2015-8816", "url": "https://bugzilla.suse.com/979064" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:53Z", "details": "low" } ], "title": "CVE-2015-8816" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:53Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:53Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:53Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:53Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:53Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:53Z", "details": "moderate" } ], "title": "CVE-2016-4565" } ] }
suse-su-2016:2000-1
Vulnerability from csaf_suse
Published
2016-08-09 11:24
Modified
2016-08-09 11:24
Summary
Security update for Linux Kernel Live Patch 4 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 4 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.57-60_35 fixes the several issues.
These security issues were fixed:
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1179
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 4 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.57-60_35 fixes the several issues.\n\nThese security issues were fixed:\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1179", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2000-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2000-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162000-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2000-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002187.html" }, { "category": "self", "summary": "SUSE Bug 971793", "url": "https://bugzilla.suse.com/971793" }, { "category": "self", "summary": "SUSE Bug 979074", "url": "https://bugzilla.suse.com/979074" }, { "category": "self", "summary": "SUSE Bug 980856", "url": "https://bugzilla.suse.com/980856" }, { "category": "self", "summary": "SUSE Bug 980883", "url": "https://bugzilla.suse.com/980883" }, { "category": "self", "summary": "SUSE Bug 983144", "url": "https://bugzilla.suse.com/983144" }, { "category": "self", "summary": "SUSE Bug 984764", "url": "https://bugzilla.suse.com/984764" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7446 page", "url": "https://www.suse.com/security/cve/CVE-2013-7446/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" } ], "title": "Security update for Linux Kernel Live Patch 4 for SLE 12 SP1", "tracking": { "current_release_date": "2016-08-09T11:24:59Z", "generator": { "date": "2016-08-09T11:24:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2000-1", "initial_release_date": "2016-08-09T11:24:59Z", "revision_history": [ { "date": "2016-08-09T11:24:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "product_id": "kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64", "product_id": "kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7446" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7446", "url": "https://www.suse.com/security/cve/CVE-2013-7446" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-7446", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 955654 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955654" }, { "category": "external", "summary": "SUSE Bug 955837 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:59Z", "details": "moderate" } ], "title": "CVE-2013-7446" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:59Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:59Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:59Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:59Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:59Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:24:59Z", "details": "moderate" } ], "title": "CVE-2016-4565" } ] }
suse-su-2016:2009-1
Vulnerability from csaf_suse
Published
2016-08-09 11:25
Modified
2016-08-09 11:25
Summary
Security update for Linux Kernel Live Patch 2 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 2 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.51-60_25 fixes the several issues.
These security issues were fixed:
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).
- CVE-2015-8019: The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel did not accept a length argument, which allowed local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call (bsc#979078).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).
This non-security issue was fixed:
- bsc#973570: The fix for CVE-2013-7446 introduced a bug that could have possibly lead to a softlockup.
Patchnames
SUSE-SLE-Live-Patching-12-2016-1182
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 2 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-60_25 fixes the several issues.\n\nThese security issues were fixed:\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).\n- CVE-2015-8019: The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel did not accept a length argument, which allowed local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call (bsc#979078).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).\n- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).\n\nThis non-security issue was fixed:\n- bsc#973570: The fix for CVE-2013-7446 introduced a bug that could have possibly lead to a softlockup. \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1182", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2009-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2009-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162009-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2009-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002195.html" }, { "category": "self", "summary": "SUSE Bug 971793", "url": "https://bugzilla.suse.com/971793" }, { "category": "self", "summary": "SUSE Bug 973570", "url": "https://bugzilla.suse.com/973570" }, { "category": "self", "summary": "SUSE Bug 979064", "url": "https://bugzilla.suse.com/979064" }, { "category": "self", "summary": "SUSE Bug 979074", "url": "https://bugzilla.suse.com/979074" }, { "category": "self", "summary": "SUSE Bug 979078", "url": "https://bugzilla.suse.com/979078" }, { "category": "self", "summary": "SUSE Bug 980856", "url": "https://bugzilla.suse.com/980856" }, { "category": "self", "summary": "SUSE Bug 980883", "url": "https://bugzilla.suse.com/980883" }, { "category": "self", "summary": "SUSE Bug 983144", "url": "https://bugzilla.suse.com/983144" }, { "category": "self", "summary": "SUSE Bug 984764", "url": "https://bugzilla.suse.com/984764" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7446 page", "url": "https://www.suse.com/security/cve/CVE-2013-7446/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8019 page", "url": "https://www.suse.com/security/cve/CVE-2015-8019/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8816 page", "url": "https://www.suse.com/security/cve/CVE-2015-8816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" } ], "title": "Security update for Linux Kernel Live Patch 2 for SLE 12 SP1", "tracking": { "current_release_date": "2016-08-09T11:25:36Z", "generator": { "date": "2016-08-09T11:25:36Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2009-1", "initial_release_date": "2016-08-09T11:25:36Z", "revision_history": [ { "date": "2016-08-09T11:25:36Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7446" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7446", "url": "https://www.suse.com/security/cve/CVE-2013-7446" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-7446", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 955654 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955654" }, { "category": "external", "summary": "SUSE Bug 955837 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:36Z", "details": "moderate" } ], "title": "CVE-2013-7446" }, { "cve": "CVE-2015-8019", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8019" } ], "notes": [ { "category": "general", "text": "The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel 3.14.54 and 3.18.22 does not accept a length argument, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8019", "url": "https://www.suse.com/security/cve/CVE-2015-8019" }, { "category": "external", "summary": "SUSE Bug 1032268 for CVE-2015-8019", "url": "https://bugzilla.suse.com/1032268" }, { "category": "external", "summary": "SUSE Bug 951199 for CVE-2015-8019", "url": "https://bugzilla.suse.com/951199" }, { "category": "external", "summary": "SUSE Bug 952587 for CVE-2015-8019", "url": "https://bugzilla.suse.com/952587" }, { "category": "external", "summary": "SUSE Bug 979078 for CVE-2015-8019", "url": "https://bugzilla.suse.com/979078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:36Z", "details": "moderate" } ], "title": "CVE-2015-8019" }, { "cve": "CVE-2015-8816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8816" } ], "notes": [ { "category": "general", "text": "The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8816", "url": "https://www.suse.com/security/cve/CVE-2015-8816" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8816", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968010 for CVE-2015-8816", "url": "https://bugzilla.suse.com/968010" }, { "category": "external", "summary": "SUSE Bug 979064 for CVE-2015-8816", "url": "https://bugzilla.suse.com/979064" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:36Z", "details": "low" } ], "title": "CVE-2015-8816" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:36Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:36Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:36Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:36Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:36Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:36Z", "details": "moderate" } ], "title": "CVE-2016-4565" } ] }
suse-su-2016:2010-1
Vulnerability from csaf_suse
Published
2016-08-09 11:23
Modified
2016-08-09 11:23
Summary
Security update for Linux Kernel Live Patch 11 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 11 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.51-52_39 fixes several issues.
The following security bugs were fixed:
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bsc#973570, bsc#955837).
Patchnames
SUSE-SLE-SAP-12-2016-1174,SUSE-SLE-SERVER-12-2016-1174
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 11 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-52_39 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).\n- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).\n- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bsc#973570, bsc#955837).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1174,SUSE-SLE-SERVER-12-2016-1174", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2010-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2010-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162010-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2010-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002196.html" }, { "category": "self", "summary": "SUSE Bug 955837", "url": "https://bugzilla.suse.com/955837" }, { "category": "self", "summary": "SUSE Bug 971793", "url": "https://bugzilla.suse.com/971793" }, { "category": "self", "summary": "SUSE Bug 973570", "url": "https://bugzilla.suse.com/973570" }, { "category": "self", "summary": "SUSE Bug 979064", "url": "https://bugzilla.suse.com/979064" }, { "category": "self", "summary": "SUSE Bug 979074", "url": "https://bugzilla.suse.com/979074" }, { "category": "self", "summary": "SUSE Bug 980856", "url": "https://bugzilla.suse.com/980856" }, { "category": "self", "summary": "SUSE Bug 980883", "url": "https://bugzilla.suse.com/980883" }, { "category": "self", "summary": "SUSE Bug 983144", "url": "https://bugzilla.suse.com/983144" }, { "category": "self", "summary": "SUSE Bug 984764", "url": "https://bugzilla.suse.com/984764" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7446 page", "url": "https://www.suse.com/security/cve/CVE-2013-7446/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8816 page", "url": "https://www.suse.com/security/cve/CVE-2015-8816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" } ], "title": "Security update for Linux Kernel Live Patch 11 for SLE 12", "tracking": { "current_release_date": "2016-08-09T11:23:39Z", "generator": { "date": "2016-08-09T11:23:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2010-1", "initial_release_date": "2016-08-09T11:23:39Z", "revision_history": [ { "date": "2016-08-09T11:23:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "product_id": "kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "product_id": "kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7446" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7446", "url": "https://www.suse.com/security/cve/CVE-2013-7446" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-7446", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 955654 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955654" }, { "category": "external", "summary": "SUSE Bug 955837 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:39Z", "details": "moderate" } ], "title": "CVE-2013-7446" }, { "cve": "CVE-2015-8816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8816" } ], "notes": [ { "category": "general", "text": "The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8816", "url": "https://www.suse.com/security/cve/CVE-2015-8816" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8816", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968010 for CVE-2015-8816", "url": "https://bugzilla.suse.com/968010" }, { "category": "external", "summary": "SUSE Bug 979064 for CVE-2015-8816", "url": "https://bugzilla.suse.com/979064" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:39Z", "details": "low" } ], "title": "CVE-2015-8816" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:39Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:39Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:39Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:39Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:39Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:39Z", "details": "moderate" } ], "title": "CVE-2016-4565" } ] }
suse-su-2016:2245-1
Vulnerability from csaf_suse
Published
2016-09-06 09:28
Modified
2016-09-06 09:28
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-3955: The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel allowed remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet (bnc#975945).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure was initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack. (bsc#989152)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability. (bsc#991608)
The following non-security bugs were fixed:
- Update patches.fixes/pci-determine-actual-vpd-size-on-first-access.patch (bsc#971729, bsc#974428).
- Update PCI VPD size patch to upstream:
* PCI: Determine actual VPD size on first access (bsc#971729).
* PCI: Update VPD definitions (bsc#971729). (cherry picked from commit d2af5b7e0cd7ee2a54f02ad65ec300d16b3ad956)
- Update patches.fixes/pci-update-vpd-definitions.patch (bsc#971729, bsc#974428).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- fs/cifs: Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- hid: add ALWAYS_POLL quirk for a Logitech 0xc055 (bnc#962404).
- hid: add HP OEM mouse to quirk ALWAYS_POLL (bsc#919351).
- hid: add quirk for PIXART OEM mouse used by HP (bsc#919351).
- hid-elo: kill not flush the work.
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- ipv4: fix ineffective source address selection (bsc#980788).
- ipvs: count pre-established TCP states as active (bsc#970114).
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).
- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- nfs: Do not attempt to decode missing directory entries (bsc#980931).
- nfs: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).
- nfs: reduce access cache shrinker locking (bnc#866130).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- s390/cio: collect format 1 channel-path description data (bsc#966460,LTC#136434).
- s390/cio: ensure consistent measurement state (bsc#966460,LTC#136434).
- s390/cio: fix measurement characteristics memleak (bsc#966460,LTC#136434).
- s390/cio: update measurement characteristics (bsc#966460,LTC#136434).
- usbhid: add device USB_DEVICE_ID_LOGITECH_C077 (bsc#919351).
- usbhid: more mice with ALWAYS_POLL (bsc#919351).
- usbhid: yet another mouse with ALWAYS_POLL (bsc#919351).
- veth: do not modify ip_summed (bsc#969149).
- virtio_scsi: Implement eh_timed_out callback.
- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).
- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
- xfs: avoid xfs_buf hang in lookup node directory corruption (bsc#989401).
- xfs: only update the last_sync_lsn when a transaction completes (bsc#987709).
Patchnames
sleclo50sp3-kernel-12730,sleman21-kernel-12730,slemap21-kernel-12730,sleposp3-kernel-12730,slessp3-kernel-12730,slexsp3-kernel-12730
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n- CVE-2016-3955: The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel allowed remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet (bnc#975945).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).\n- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).\n- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure was initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).\n- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \\0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).\n- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).\n- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).\n- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).\n- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).\n- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).\n- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).\n- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack. (bsc#989152)\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability. (bsc#991608)\n\nThe following non-security bugs were fixed:\n- Update patches.fixes/pci-determine-actual-vpd-size-on-first-access.patch (bsc#971729, bsc#974428).\n- Update PCI VPD size patch to upstream: \n * PCI: Determine actual VPD size on first access (bsc#971729). \n * PCI: Update VPD definitions (bsc#971729). (cherry picked from commit d2af5b7e0cd7ee2a54f02ad65ec300d16b3ad956)\n- Update patches.fixes/pci-update-vpd-definitions.patch (bsc#971729, bsc#974428).\n- cgroups: do not attach task to subsystem if migration failed (bnc#979274).\n- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).\n- fs/cifs: Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)\n- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- hid: add ALWAYS_POLL quirk for a Logitech 0xc055 (bnc#962404).\n- hid: add HP OEM mouse to quirk ALWAYS_POLL (bsc#919351).\n- hid: add quirk for PIXART OEM mouse used by HP (bsc#919351).\n- hid-elo: kill not flush the work.\n- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).\n- ipv4: fix ineffective source address selection (bsc#980788).\n- ipvs: count pre-established TCP states as active (bsc#970114).\n- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).\n- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).\n- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- nfs: Do not attempt to decode missing directory entries (bsc#980931).\n- nfs: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).\n- nfs: reduce access cache shrinker locking (bnc#866130).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- s390/cio: collect format 1 channel-path description data (bsc#966460,LTC#136434).\n- s390/cio: ensure consistent measurement state (bsc#966460,LTC#136434).\n- s390/cio: fix measurement characteristics memleak (bsc#966460,LTC#136434).\n- s390/cio: update measurement characteristics (bsc#966460,LTC#136434).\n- usbhid: add device USB_DEVICE_ID_LOGITECH_C077 (bsc#919351).\n- usbhid: more mice with ALWAYS_POLL (bsc#919351).\n- usbhid: yet another mouse with ALWAYS_POLL (bsc#919351).\n- veth: do not modify ip_summed (bsc#969149).\n- virtio_scsi: Implement eh_timed_out callback.\n- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).\n- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).\n- xfs: avoid xfs_buf hang in lookup node directory corruption (bsc#989401).\n- xfs: only update the last_sync_lsn when a transaction completes (bsc#987709).\n", "title": "Description of the patch" }, { "category": "details", "text": "sleclo50sp3-kernel-12730,sleman21-kernel-12730,slemap21-kernel-12730,sleposp3-kernel-12730,slessp3-kernel-12730,slexsp3-kernel-12730", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2245-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2245-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162245-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2245-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" }, { "category": "self", "summary": "SUSE Bug 839104", "url": "https://bugzilla.suse.com/839104" }, { "category": "self", "summary": "SUSE Bug 866130", "url": "https://bugzilla.suse.com/866130" }, { "category": "self", "summary": "SUSE Bug 919351", "url": "https://bugzilla.suse.com/919351" }, { "category": "self", "summary": "SUSE Bug 944309", "url": "https://bugzilla.suse.com/944309" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 960689", "url": "https://bugzilla.suse.com/960689" }, { "category": "self", "summary": "SUSE Bug 962404", "url": "https://bugzilla.suse.com/962404" }, { "category": "self", "summary": "SUSE Bug 963655", "url": "https://bugzilla.suse.com/963655" }, { "category": "self", "summary": "SUSE Bug 963762", "url": "https://bugzilla.suse.com/963762" }, { "category": "self", "summary": "SUSE Bug 966460", "url": "https://bugzilla.suse.com/966460" }, { "category": "self", "summary": "SUSE Bug 969149", "url": "https://bugzilla.suse.com/969149" }, { "category": "self", "summary": "SUSE Bug 970114", "url": "https://bugzilla.suse.com/970114" }, { "category": "self", "summary": "SUSE Bug 971126", "url": "https://bugzilla.suse.com/971126" }, { "category": "self", "summary": "SUSE Bug 971360", "url": "https://bugzilla.suse.com/971360" }, { "category": "self", "summary": "SUSE Bug 971446", "url": "https://bugzilla.suse.com/971446" }, { "category": "self", "summary": "SUSE Bug 971729", "url": "https://bugzilla.suse.com/971729" }, { "category": "self", "summary": "SUSE Bug 971944", "url": "https://bugzilla.suse.com/971944" }, { "category": "self", "summary": "SUSE Bug 974428", "url": "https://bugzilla.suse.com/974428" }, { "category": "self", "summary": "SUSE Bug 975945", "url": "https://bugzilla.suse.com/975945" }, { "category": "self", "summary": "SUSE Bug 978401", "url": "https://bugzilla.suse.com/978401" }, { "category": "self", "summary": "SUSE Bug 978821", "url": "https://bugzilla.suse.com/978821" }, { "category": "self", "summary": "SUSE Bug 978822", "url": "https://bugzilla.suse.com/978822" }, { "category": "self", "summary": "SUSE Bug 979213", "url": "https://bugzilla.suse.com/979213" }, { "category": "self", "summary": "SUSE Bug 979274", "url": "https://bugzilla.suse.com/979274" }, { "category": "self", "summary": "SUSE Bug 979548", "url": "https://bugzilla.suse.com/979548" }, { "category": "self", "summary": "SUSE Bug 979681", "url": "https://bugzilla.suse.com/979681" }, { "category": "self", "summary": "SUSE Bug 979867", "url": "https://bugzilla.suse.com/979867" }, { "category": "self", "summary": "SUSE Bug 979879", "url": "https://bugzilla.suse.com/979879" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 980725", "url": "https://bugzilla.suse.com/980725" }, { "category": "self", "summary": "SUSE Bug 980788", "url": "https://bugzilla.suse.com/980788" }, { "category": "self", "summary": "SUSE Bug 980931", "url": "https://bugzilla.suse.com/980931" }, { "category": "self", "summary": "SUSE Bug 981267", "url": "https://bugzilla.suse.com/981267" }, { "category": "self", "summary": "SUSE Bug 983143", "url": "https://bugzilla.suse.com/983143" }, { "category": "self", "summary": "SUSE Bug 983213", "url": "https://bugzilla.suse.com/983213" }, { "category": "self", "summary": "SUSE Bug 983535", "url": "https://bugzilla.suse.com/983535" }, { "category": "self", "summary": "SUSE Bug 984107", "url": "https://bugzilla.suse.com/984107" }, { "category": "self", "summary": "SUSE Bug 984755", "url": "https://bugzilla.suse.com/984755" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 986572", "url": "https://bugzilla.suse.com/986572" }, { "category": "self", "summary": "SUSE Bug 987709", "url": "https://bugzilla.suse.com/987709" }, { "category": "self", "summary": "SUSE Bug 988065", "url": "https://bugzilla.suse.com/988065" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989401", "url": "https://bugzilla.suse.com/989401" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4312 page", "url": "https://www.suse.com/security/cve/CVE-2013-4312/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7513 page", "url": "https://www.suse.com/security/cve/CVE-2015-7513/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7833 page", "url": "https://www.suse.com/security/cve/CVE-2015-7833/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2187 page", "url": "https://www.suse.com/security/cve/CVE-2016-2187/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3955 page", "url": "https://www.suse.com/security/cve/CVE-2016-3955/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4482 page", "url": "https://www.suse.com/security/cve/CVE-2016-4482/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4485 page", "url": "https://www.suse.com/security/cve/CVE-2016-4485/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4580 page", "url": "https://www.suse.com/security/cve/CVE-2016-4580/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4805 page", "url": "https://www.suse.com/security/cve/CVE-2016-4805/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4913 page", "url": "https://www.suse.com/security/cve/CVE-2016-4913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-09-06T09:28:39Z", "generator": { "date": "2016-09-06T09:28:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2245-1", "initial_release_date": "2016-09-06T09:28:39Z", "revision_history": [ { "date": "2016-09-06T09:28:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-default-3.0.101-0.47.86.1.i586", "product_id": "kernel-default-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.47.86.1.i586", "product_id": "kernel-default-base-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.47.86.1.i586", "product_id": "kernel-default-devel-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.47.86.1.i586", "product_id": "kernel-ec2-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-pae-3.0.101-0.47.86.1.i586", "product_id": "kernel-pae-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.47.86.1.i586", "product_id": "kernel-pae-base-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.47.86.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-source-3.0.101-0.47.86.1.i586", "product_id": "kernel-source-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-syms-3.0.101-0.47.86.1.i586", "product_id": "kernel-syms-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-trace-3.0.101-0.47.86.1.i586", "product_id": "kernel-trace-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.47.86.1.i586", "product_id": "kernel-trace-base-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-xen-3.0.101-0.47.86.1.i586", "product_id": "kernel-xen-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.47.86.1.i586", "product_id": "kernel-xen-base-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.47.86.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-default-3.0.101-0.47.86.1.s390x", "product_id": "kernel-default-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.47.86.1.s390x", "product_id": "kernel-default-base-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.47.86.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.47.86.1.s390x", "product_id": "kernel-default-man-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-source-3.0.101-0.47.86.1.s390x", "product_id": "kernel-source-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.47.86.1.s390x", "product_id": "kernel-syms-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.47.86.1.s390x", "product_id": "kernel-trace-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.47.86.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.47.86.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-default-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-source-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-syms-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-trace-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-xen-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 5", "product": { "name": "SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5", "product_identification_helper": { "cpe": "cpe:/o:suse:cloud:5" } } }, { "category": "product_name", "name": "SUSE Manager 2.1", "product": { "name": "SUSE Manager 2.1", "product_id": "SUSE Manager 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:2.1" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 2.1", "product": { "name": "SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:2.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4312" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4312", "url": "https://www.suse.com/security/cve/CVE-2013-4312" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-4312", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 839104 for CVE-2013-4312", "url": "https://bugzilla.suse.com/839104" }, { "category": "external", "summary": "SUSE Bug 922947 for CVE-2013-4312", "url": "https://bugzilla.suse.com/922947" }, { "category": "external", "summary": "SUSE Bug 968014 for CVE-2013-4312", "url": "https://bugzilla.suse.com/968014" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2013-4312" }, { "cve": "CVE-2015-7513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7513" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7513", "url": "https://www.suse.com/security/cve/CVE-2015-7513" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7513", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 960689 for CVE-2015-7513", "url": "https://bugzilla.suse.com/960689" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2015-7513", "url": "https://bugzilla.suse.com/987709" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2015-7513" }, { "cve": "CVE-2015-7833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7833" } ], "notes": [ { "category": "general", "text": "The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7833", "url": "https://www.suse.com/security/cve/CVE-2015-7833" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7833", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 950998 for CVE-2015-7833", "url": "https://bugzilla.suse.com/950998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2015-7833" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-2187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2187" } ], "notes": [ { "category": "general", "text": "The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2187", "url": "https://www.suse.com/security/cve/CVE-2016-2187" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2187", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971919 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971919" }, { "category": "external", "summary": "SUSE Bug 971944 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-2187" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-3955", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3955" } ], "notes": [ { "category": "general", "text": "The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel before 4.5.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3955", "url": "https://www.suse.com/security/cve/CVE-2016-3955" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3955", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 975945 for CVE-2016-3955", "url": "https://bugzilla.suse.com/975945" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-3955", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "important" } ], "title": "CVE-2016-3955" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4482", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4482" } ], "notes": [ { "category": "general", "text": "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4482", "url": "https://www.suse.com/security/cve/CVE-2016-4482" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4482", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978401 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978401" }, { "category": "external", "summary": "SUSE Bug 978445 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4482" }, { "cve": "CVE-2016-4485", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4485" } ], "notes": [ { "category": "general", "text": "The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4485", "url": "https://www.suse.com/security/cve/CVE-2016-4485" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4485", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978821 for CVE-2016-4485", "url": "https://bugzilla.suse.com/978821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-4485" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4486" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-4565" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4580" } ], "notes": [ { "category": "general", "text": "The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4580", "url": "https://www.suse.com/security/cve/CVE-2016-4580" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4580", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 981267 for CVE-2016-4580", "url": "https://bugzilla.suse.com/981267" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4580", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4580" }, { "cve": "CVE-2016-4805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4805" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4805", "url": "https://www.suse.com/security/cve/CVE-2016-4805" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 980371 for CVE-2016-4805", "url": "https://bugzilla.suse.com/980371" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4805" }, { "cve": "CVE-2016-4913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4913" } ], "notes": [ { "category": "general", "text": "The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \\0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4913", "url": "https://www.suse.com/security/cve/CVE-2016-4913" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4913", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4913", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 980725 for CVE-2016-4913", "url": "https://bugzilla.suse.com/980725" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4913", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-4913" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-5244" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-6480" } ] }
suse-su-2017:0333-1
Vulnerability from csaf_suse
Published
2017-01-30 16:03
Modified
2017-01-30 16:03
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to receive various security and bugfixes.
This is the last planned LTSS kernel update for the SUSE Linux Enterprise Server 11 SP2 LTSS.
The following security bugs were fixed:
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-8399: An out of bounds read in the ping protocol handler could have lead to information disclosure (bsc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2017-5551: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. This CVE tracks the fix for the tmpfs filesystem. (bsc#1021258).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bsc#986365).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
The following non-security bugs were fixed:
- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).
- dasd: Fix unresumed device after suspend/resume (bnc#927287, LTC#123892).
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kvm: x86: SYSENTER emulation is broken (bsc#994618).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (VM Functionality, bsc#1008645).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261, bsc#1011482).
- nfs: do not do blind d_drop() in nfs_prime_dcache() (bnc#908069 bnc#896484 bsc#963053).
- nfs_prime_dcache needs fh to be set (bnc#908069 bnc#896484 bsc#963053).
- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- nfsv4: Ensure that we do not drop a state owner more than once (bsc#979595).
- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595, bsc#1011482).
- nfsv4: nfs4_proc_renew should be declared static (bnc#863873).
- nfsv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514 bsc#1011482).
- nfsv4: The NFSv4.0 client must send RENEW calls if it holds a delegation (bnc#863873).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: dtc is required to build dtb files (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS & cscope (bsc#967716).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils < 2.12.1 (bsc#967716).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).
- qeth: Fix crash on initial MTU size change (bnc#835175, LTC#96809).
- qeth: postpone freeing of qdio memory (bnc#874145, LTC#107873).
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- Revert 's390/mm: fix asce_bits handling with dynamic pagetable levels' This reverts commit 6e00b1d803fa2ab4b130e04b7fbcc99f0b5ecba8.
- rpm/config.sh: Set the release string to 0.7.<RELEASE> (bsc#997059)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- s390/dasd: fix failfast for disconnected devices (bnc#958000, LTC#135138).
- s390/dasd: fix hanging device after clear subchannel (bnc#994436, LTC#144640).
- s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954984, LTC#133077).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456). Conflicts: series.conf
- s390/pageattr: do a single TLB flush for change_page_attr (bsc#1009443,LTC#148182).
- Set CONFIG_DEBUG_INFO=y and CONFIG_DEBUG_INFO_REDUCED=n on all platforms The specfile adjusts the config if necessary, but a new version of run_oldconfig.sh requires the settings to be present in the repository.
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
Patchnames
slessp2-kernel-12961
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\nThis is the last planned LTSS kernel update for the SUSE Linux Enterprise Server 11 SP2 LTSS.\n\nThe following security bugs were fixed:\n\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340).\n- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).\n- CVE-2016-8399: An out of bounds read in the ping protocol handler could have lead to information disclosure (bsc#1014746).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).\n- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).\n- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).\n- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).\n- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).\n- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467).\n- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).\n- CVE-2017-5551: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. This CVE tracks the fix for the tmpfs filesystem. (bsc#1021258).\n- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).\n- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).\n- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).\n- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bnc#991608).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bsc#986365).\n- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).\n- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).\n- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \\0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).\n- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).\n- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).\n- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).\n- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).\n- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n\n\nThe following non-security bugs were fixed:\n\n- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- cgroups: do not attach task to subsystem if migration failed (bnc#979274).\n- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).\n- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).\n- dasd: Fix unresumed device after suspend/resume (bnc#927287, LTC#123892).\n- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).\n- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kvm: x86: SYSENTER emulation is broken (bsc#994618).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (VM Functionality, bsc#1008645).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).\n- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261, bsc#1011482).\n- nfs: do not do blind d_drop() in nfs_prime_dcache() (bnc#908069 bnc#896484 bsc#963053).\n- nfs_prime_dcache needs fh to be set (bnc#908069 bnc#896484 bsc#963053).\n- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).\n- nfsv4: Ensure that we do not drop a state owner more than once (bsc#979595).\n- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595, bsc#1011482).\n- nfsv4: nfs4_proc_renew should be declared static (bnc#863873).\n- nfsv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).\n- nfsv4: Recovery of recalled read delegations is broken (bsc#956514 bsc#1011482).\n- nfsv4: The NFSv4.0 client must send RENEW calls if it holds a delegation (bnc#863873).\n- powerpc: Add ability to build little endian kernels (bsc#967716).\n- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).\n- powerpc: Do not build assembly files with ABIv2 (bsc#967716).\n- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).\n- powerpc: dtc is required to build dtb files (bsc#967716).\n- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).\n- powerpc: Fix error when cross building TAGS \u0026 cscope (bsc#967716).\n- powerpc: Make the vdso32 also build big-endian (bsc#967716).\n- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).\n- powerpc: Remove buggy 9-year-old test for binutils \u003c 2.12.1 (bsc#967716).\n- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).\n- qeth: Fix crash on initial MTU size change (bnc#835175, LTC#96809).\n- qeth: postpone freeing of qdio memory (bnc#874145, LTC#107873).\n- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)\n- Revert \u0027s390/mm: fix asce_bits handling with dynamic pagetable levels\u0027 This reverts commit 6e00b1d803fa2ab4b130e04b7fbcc99f0b5ecba8.\n- rpm/config.sh: Set the release string to 0.7.\u003cRELEASE\u003e (bsc#997059)\n- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)\n- s390/dasd: fix failfast for disconnected devices (bnc#958000, LTC#135138).\n- s390/dasd: fix hanging device after clear subchannel (bnc#994436, LTC#144640).\n- s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595).\n- s390/dasd: fix list_del corruption after lcu changes (bnc#954984, LTC#133077).\n- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456). Conflicts: \tseries.conf\n- s390/pageattr: do a single TLB flush for change_page_attr (bsc#1009443,LTC#148182).\n- Set CONFIG_DEBUG_INFO=y and CONFIG_DEBUG_INFO_REDUCED=n on all platforms The specfile adjusts the config if necessary, but a new version of run_oldconfig.sh requires the settings to be present in the repository.\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp2-kernel-12961", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0333-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0333-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170333-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0333-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" }, { "category": "self", "summary": "SUSE Bug 1003077", "url": "https://bugzilla.suse.com/1003077" }, { "category": "self", "summary": "SUSE Bug 1003925", "url": "https://bugzilla.suse.com/1003925" }, { "category": "self", "summary": "SUSE Bug 1004517", "url": "https://bugzilla.suse.com/1004517" }, { "category": "self", "summary": "SUSE Bug 1007944", "url": "https://bugzilla.suse.com/1007944" }, { "category": "self", "summary": "SUSE Bug 1008645", "url": "https://bugzilla.suse.com/1008645" }, { "category": "self", "summary": "SUSE Bug 1008831", "url": "https://bugzilla.suse.com/1008831" }, { "category": "self", "summary": "SUSE Bug 1008833", "url": "https://bugzilla.suse.com/1008833" }, { "category": "self", "summary": "SUSE Bug 1009443", "url": "https://bugzilla.suse.com/1009443" }, { "category": "self", "summary": "SUSE Bug 1010150", "url": "https://bugzilla.suse.com/1010150" }, { "category": "self", "summary": "SUSE Bug 1010467", "url": "https://bugzilla.suse.com/1010467" }, { "category": "self", "summary": "SUSE Bug 1010501", "url": "https://bugzilla.suse.com/1010501" }, { "category": "self", "summary": "SUSE Bug 1010507", "url": "https://bugzilla.suse.com/1010507" }, { "category": "self", "summary": "SUSE Bug 1010711", "url": "https://bugzilla.suse.com/1010711" }, { "category": "self", "summary": "SUSE Bug 1010716", "url": "https://bugzilla.suse.com/1010716" }, { "category": "self", "summary": "SUSE Bug 1011482", "url": "https://bugzilla.suse.com/1011482" }, { "category": "self", "summary": "SUSE Bug 1011685", "url": "https://bugzilla.suse.com/1011685" }, { "category": "self", "summary": "SUSE Bug 1012422", "url": "https://bugzilla.suse.com/1012422" }, { "category": "self", "summary": "SUSE Bug 1012832", "url": "https://bugzilla.suse.com/1012832" }, { "category": "self", "summary": "SUSE Bug 1013038", "url": "https://bugzilla.suse.com/1013038" }, { "category": "self", "summary": "SUSE Bug 1013531", "url": "https://bugzilla.suse.com/1013531" }, { "category": "self", "summary": "SUSE Bug 1013542", "url": "https://bugzilla.suse.com/1013542" }, { "category": "self", "summary": "SUSE Bug 1014746", "url": "https://bugzilla.suse.com/1014746" }, { "category": "self", "summary": "SUSE Bug 1017710", "url": "https://bugzilla.suse.com/1017710" }, { "category": "self", "summary": "SUSE Bug 1021258", "url": "https://bugzilla.suse.com/1021258" }, { "category": "self", "summary": "SUSE Bug 835175", "url": "https://bugzilla.suse.com/835175" }, { "category": "self", "summary": "SUSE Bug 839104", "url": "https://bugzilla.suse.com/839104" }, { "category": "self", "summary": "SUSE Bug 863873", "url": "https://bugzilla.suse.com/863873" }, { "category": "self", "summary": "SUSE Bug 874145", "url": "https://bugzilla.suse.com/874145" }, { "category": "self", "summary": "SUSE Bug 896484", "url": "https://bugzilla.suse.com/896484" }, { "category": "self", "summary": "SUSE Bug 908069", "url": "https://bugzilla.suse.com/908069" }, { "category": "self", "summary": "SUSE Bug 914939", "url": "https://bugzilla.suse.com/914939" }, { "category": "self", "summary": "SUSE Bug 922947", "url": "https://bugzilla.suse.com/922947" }, { "category": "self", "summary": "SUSE Bug 927287", "url": "https://bugzilla.suse.com/927287" }, { "category": "self", "summary": "SUSE Bug 940966", "url": "https://bugzilla.suse.com/940966" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 954984", "url": "https://bugzilla.suse.com/954984" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 958000", "url": "https://bugzilla.suse.com/958000" }, { "category": "self", "summary": "SUSE Bug 960689", "url": "https://bugzilla.suse.com/960689" }, { "category": "self", "summary": "SUSE Bug 963053", "url": "https://bugzilla.suse.com/963053" }, { "category": "self", "summary": "SUSE Bug 967716", "url": "https://bugzilla.suse.com/967716" }, { "category": "self", "summary": "SUSE Bug 968500", "url": "https://bugzilla.suse.com/968500" }, { "category": "self", "summary": "SUSE Bug 969340", "url": "https://bugzilla.suse.com/969340" }, { "category": "self", "summary": "SUSE Bug 971360", "url": "https://bugzilla.suse.com/971360" }, { "category": "self", "summary": "SUSE Bug 971944", "url": "https://bugzilla.suse.com/971944" }, { "category": "self", "summary": "SUSE Bug 978401", "url": "https://bugzilla.suse.com/978401" }, { "category": "self", "summary": "SUSE Bug 978821", "url": "https://bugzilla.suse.com/978821" }, { "category": "self", "summary": "SUSE Bug 979213", "url": "https://bugzilla.suse.com/979213" }, { "category": "self", "summary": "SUSE Bug 979274", "url": "https://bugzilla.suse.com/979274" }, { "category": "self", "summary": "SUSE Bug 979548", "url": "https://bugzilla.suse.com/979548" }, { "category": "self", "summary": "SUSE Bug 979595", "url": "https://bugzilla.suse.com/979595" }, { "category": "self", "summary": "SUSE Bug 979879", "url": "https://bugzilla.suse.com/979879" }, { "category": "self", "summary": "SUSE Bug 979915", "url": "https://bugzilla.suse.com/979915" }, { "category": "self", "summary": "SUSE Bug 980363", "url": "https://bugzilla.suse.com/980363" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 980725", "url": "https://bugzilla.suse.com/980725" }, { "category": "self", "summary": "SUSE Bug 981267", "url": "https://bugzilla.suse.com/981267" }, { "category": "self", "summary": "SUSE Bug 983143", "url": "https://bugzilla.suse.com/983143" }, { "category": "self", "summary": "SUSE Bug 983213", "url": "https://bugzilla.suse.com/983213" }, { "category": "self", "summary": "SUSE Bug 984755", "url": "https://bugzilla.suse.com/984755" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 986572", "url": "https://bugzilla.suse.com/986572" }, { "category": "self", "summary": "SUSE Bug 989261", "url": "https://bugzilla.suse.com/989261" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE Bug 991665", "url": "https://bugzilla.suse.com/991665" }, { "category": "self", "summary": "SUSE Bug 992566", "url": "https://bugzilla.suse.com/992566" }, { "category": "self", "summary": "SUSE Bug 993890", "url": "https://bugzilla.suse.com/993890" }, { "category": "self", "summary": "SUSE Bug 993891", "url": "https://bugzilla.suse.com/993891" }, { "category": "self", "summary": "SUSE Bug 994296", "url": "https://bugzilla.suse.com/994296" }, { "category": "self", "summary": "SUSE Bug 994436", "url": "https://bugzilla.suse.com/994436" }, { "category": "self", "summary": "SUSE Bug 994618", "url": "https://bugzilla.suse.com/994618" }, { "category": "self", "summary": "SUSE Bug 994759", "url": "https://bugzilla.suse.com/994759" }, { "category": "self", "summary": "SUSE Bug 995968", "url": "https://bugzilla.suse.com/995968" }, { "category": "self", "summary": "SUSE Bug 997059", "url": "https://bugzilla.suse.com/997059" }, { "category": "self", "summary": "SUSE Bug 999932", "url": "https://bugzilla.suse.com/999932" }, { "category": "self", "summary": "SUSE CVE CVE-2004-0230 page", "url": "https://www.suse.com/security/cve/CVE-2004-0230/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-6704 page", "url": "https://www.suse.com/security/cve/CVE-2012-6704/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4312 page", "url": "https://www.suse.com/security/cve/CVE-2013-4312/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1350 page", "url": "https://www.suse.com/security/cve/CVE-2015-1350/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7513 page", "url": "https://www.suse.com/security/cve/CVE-2015-7513/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7833 page", "url": "https://www.suse.com/security/cve/CVE-2015-7833/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8956 page", "url": "https://www.suse.com/security/cve/CVE-2015-8956/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8962 page", "url": "https://www.suse.com/security/cve/CVE-2015-8962/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8964 page", "url": "https://www.suse.com/security/cve/CVE-2015-8964/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0823 page", "url": "https://www.suse.com/security/cve/CVE-2016-0823/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10088 page", "url": "https://www.suse.com/security/cve/CVE-2016-10088/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2187 page", "url": "https://www.suse.com/security/cve/CVE-2016-2187/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2189 page", "url": "https://www.suse.com/security/cve/CVE-2016-2189/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3841 page", "url": "https://www.suse.com/security/cve/CVE-2016-3841/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4482 page", "url": "https://www.suse.com/security/cve/CVE-2016-4482/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4485 page", "url": "https://www.suse.com/security/cve/CVE-2016-4485/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4580 page", "url": "https://www.suse.com/security/cve/CVE-2016-4580/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4805 page", "url": "https://www.suse.com/security/cve/CVE-2016-4805/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4913 page", "url": "https://www.suse.com/security/cve/CVE-2016-4913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7097 page", "url": "https://www.suse.com/security/cve/CVE-2016-7097/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7910 page", "url": "https://www.suse.com/security/cve/CVE-2016-7910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7911 page", "url": "https://www.suse.com/security/cve/CVE-2016-7911/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7916 page", "url": "https://www.suse.com/security/cve/CVE-2016-7916/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8399 page", "url": "https://www.suse.com/security/cve/CVE-2016-8399/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8632 page", "url": "https://www.suse.com/security/cve/CVE-2016-8632/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8633 page", "url": "https://www.suse.com/security/cve/CVE-2016-8633/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8646 page", "url": "https://www.suse.com/security/cve/CVE-2016-8646/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9685 page", "url": "https://www.suse.com/security/cve/CVE-2016-9685/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9756 page", "url": "https://www.suse.com/security/cve/CVE-2016-9756/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9793 page", "url": "https://www.suse.com/security/cve/CVE-2016-9793/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5551 page", "url": "https://www.suse.com/security/cve/CVE-2017-5551/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-01-30T16:03:00Z", "generator": { "date": "2017-01-30T16:03:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0333-1", "initial_release_date": "2017-01-30T16:03:00Z", "revision_history": [ { "date": "2017-01-30T16:03:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-default-3.0.101-0.7.53.1.i586", "product_id": "kernel-default-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.7.53.1.i586", "product_id": "kernel-default-base-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.7.53.1.i586", "product_id": "kernel-default-devel-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.7.53.1.i586", "product_id": "kernel-ec2-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.7.53.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.7.53.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-pae-3.0.101-0.7.53.1.i586", "product_id": "kernel-pae-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.7.53.1.i586", "product_id": "kernel-pae-base-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.7.53.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-source-3.0.101-0.7.53.1.i586", "product_id": "kernel-source-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-syms-3.0.101-0.7.53.1.i586", "product_id": "kernel-syms-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-trace-3.0.101-0.7.53.1.i586", "product_id": "kernel-trace-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.7.53.1.i586", "product_id": "kernel-trace-base-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-xen-3.0.101-0.7.53.1.i586", "product_id": "kernel-xen-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.7.53.1.i586", "product_id": "kernel-xen-base-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.7.53.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.7.53.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-default-3.0.101-0.7.53.1.s390x", "product_id": "kernel-default-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.7.53.1.s390x", "product_id": "kernel-default-base-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.7.53.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.7.53.1.s390x", "product_id": "kernel-default-man-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-source-3.0.101-0.7.53.1.s390x", "product_id": "kernel-source-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.7.53.1.s390x", "product_id": "kernel-syms-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.7.53.1.s390x", "product_id": "kernel-trace-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.7.53.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.7.53.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-default-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-source-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-syms-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-trace-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-xen-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.7.53.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-default-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-source-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0230", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2004-0230" } ], "notes": [ { "category": "general", "text": "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2004-0230", "url": "https://www.suse.com/security/cve/CVE-2004-0230" }, { "category": "external", "summary": "SUSE Bug 1184394 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1184394" }, { "category": "external", "summary": "SUSE Bug 1198501 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1198501" }, { "category": "external", "summary": "SUSE Bug 1206598 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1206598" }, { "category": "external", "summary": "SUSE Bug 969340 for CVE-2004-0230", "url": "https://bugzilla.suse.com/969340" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2004-0230", "url": "https://bugzilla.suse.com/989152" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2004-0230", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2004-0230" }, { "cve": "CVE-2012-6704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-6704" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-6704", "url": "https://www.suse.com/security/cve/CVE-2012-6704" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2012-6704" }, { "cve": "CVE-2013-4312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4312" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4312", "url": "https://www.suse.com/security/cve/CVE-2013-4312" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-4312", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 839104 for CVE-2013-4312", "url": "https://bugzilla.suse.com/839104" }, { "category": "external", "summary": "SUSE Bug 922947 for CVE-2013-4312", "url": "https://bugzilla.suse.com/922947" }, { "category": "external", "summary": "SUSE Bug 968014 for CVE-2013-4312", "url": "https://bugzilla.suse.com/968014" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2013-4312" }, { "cve": "CVE-2015-1350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1350" } ], "notes": [ { "category": "general", "text": "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1350", "url": "https://www.suse.com/security/cve/CVE-2015-1350" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-1350", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 914939 for CVE-2015-1350", "url": "https://bugzilla.suse.com/914939" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2015-1350" }, { "cve": "CVE-2015-7513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7513" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7513", "url": "https://www.suse.com/security/cve/CVE-2015-7513" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7513", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 960689 for CVE-2015-7513", "url": "https://bugzilla.suse.com/960689" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2015-7513", "url": "https://bugzilla.suse.com/987709" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2015-7513" }, { "cve": "CVE-2015-7833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7833" } ], "notes": [ { "category": "general", "text": "The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7833", "url": "https://www.suse.com/security/cve/CVE-2015-7833" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7833", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 950998 for CVE-2015-7833", "url": "https://bugzilla.suse.com/950998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2015-7833" }, { "cve": "CVE-2015-8956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8956" } ], "notes": [ { "category": "general", "text": "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8956", "url": "https://www.suse.com/security/cve/CVE-2015-8956" }, { "category": "external", "summary": "SUSE Bug 1003925 for CVE-2015-8956", "url": "https://bugzilla.suse.com/1003925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2015-8956" }, { "cve": "CVE-2015-8962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8962" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8962", "url": "https://www.suse.com/security/cve/CVE-2015-8962" }, { "category": "external", "summary": "SUSE Bug 1010501 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1010501" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2015-8962" }, { "cve": "CVE-2015-8964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8964" } ], "notes": [ { "category": "general", "text": "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8964", "url": "https://www.suse.com/security/cve/CVE-2015-8964" }, { "category": "external", "summary": "SUSE Bug 1010507 for CVE-2015-8964", "url": "https://bugzilla.suse.com/1010507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2015-8964" }, { "cve": "CVE-2016-0823", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0823" } ], "notes": [ { "category": "general", "text": "The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0823", "url": "https://www.suse.com/security/cve/CVE-2016-0823" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2016-0823", "url": "https://bugzilla.suse.com/987709" }, { "category": "external", "summary": "SUSE Bug 994759 for CVE-2016-0823", "url": "https://bugzilla.suse.com/994759" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-0823" }, { "cve": "CVE-2016-10088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10088" } ], "notes": [ { "category": "general", "text": "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10088", "url": "https://www.suse.com/security/cve/CVE-2016-10088" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2016-10088" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2187" } ], "notes": [ { "category": "general", "text": "The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2187", "url": "https://www.suse.com/security/cve/CVE-2016-2187" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2187", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971919 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971919" }, { "category": "external", "summary": "SUSE Bug 971944 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-2187" }, { "cve": "CVE-2016-2189", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2189" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-4565. Reason: This candidate is a reservation duplicate of CVE-2016-4565. Notes: All CVE users should reference CVE-2016-4565 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2189", "url": "https://www.suse.com/security/cve/CVE-2016-2189" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-2189", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-2189", "url": "https://bugzilla.suse.com/980363" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-2189" }, { "cve": "CVE-2016-3841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3841" } ], "notes": [ { "category": "general", "text": "The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3841", "url": "https://www.suse.com/security/cve/CVE-2016-3841" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 992566 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992566" }, { "category": "external", "summary": "SUSE Bug 992569 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992569" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-3841" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4482", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4482" } ], "notes": [ { "category": "general", "text": "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4482", "url": "https://www.suse.com/security/cve/CVE-2016-4482" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4482", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978401 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978401" }, { "category": "external", "summary": "SUSE Bug 978445 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-4482" }, { "cve": "CVE-2016-4485", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4485" } ], "notes": [ { "category": "general", "text": "The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4485", "url": "https://www.suse.com/security/cve/CVE-2016-4485" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4485", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978821 for CVE-2016-4485", "url": "https://bugzilla.suse.com/978821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-4485" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-4565" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4580" } ], "notes": [ { "category": "general", "text": "The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4580", "url": "https://www.suse.com/security/cve/CVE-2016-4580" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4580", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 981267 for CVE-2016-4580", "url": "https://bugzilla.suse.com/981267" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4580", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-4580" }, { "cve": "CVE-2016-4805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4805" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4805", "url": "https://www.suse.com/security/cve/CVE-2016-4805" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 980371 for CVE-2016-4805", "url": "https://bugzilla.suse.com/980371" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-4805" }, { "cve": "CVE-2016-4913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4913" } ], "notes": [ { "category": "general", "text": "The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \\0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4913", "url": "https://www.suse.com/security/cve/CVE-2016-4913" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4913", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4913", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 980725 for CVE-2016-4913", "url": "https://bugzilla.suse.com/980725" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4913", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-4913" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-5244" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7097" } ], "notes": [ { "category": "general", "text": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7097", "url": "https://www.suse.com/security/cve/CVE-2016-7097" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-7097", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2016-7097", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-7097" }, { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-7425" }, { "cve": "CVE-2016-7910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7910" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7910", "url": "https://www.suse.com/security/cve/CVE-2016-7910" }, { "category": "external", "summary": "SUSE Bug 1010716 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1010716" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1196722 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1196722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2016-7910" }, { "cve": "CVE-2016-7911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7911" } ], "notes": [ { "category": "general", "text": "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7911", "url": "https://www.suse.com/security/cve/CVE-2016-7911" }, { "category": "external", "summary": "SUSE Bug 1010711 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010711" }, { "category": "external", "summary": "SUSE Bug 1010713 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010713" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-7911" }, { "cve": "CVE-2016-7916", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7916" } ], "notes": [ { "category": "general", "text": "Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7916", "url": "https://www.suse.com/security/cve/CVE-2016-7916" }, { "category": "external", "summary": "SUSE Bug 1010467 for CVE-2016-7916", "url": "https://bugzilla.suse.com/1010467" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-7916" }, { "cve": "CVE-2016-8399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8399" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8399", "url": "https://www.suse.com/security/cve/CVE-2016-8399" }, { "category": "external", "summary": "SUSE Bug 1014746 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1014746" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-8399" }, { "cve": "CVE-2016-8632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8632" } ], "notes": [ { "category": "general", "text": "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8632", "url": "https://www.suse.com/security/cve/CVE-2016-8632" }, { "category": "external", "summary": "SUSE Bug 1008831 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1008831" }, { "category": "external", "summary": "SUSE Bug 1012852 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1012852" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-8632" }, { "cve": "CVE-2016-8633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8633" } ], "notes": [ { "category": "general", "text": "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8633", "url": "https://www.suse.com/security/cve/CVE-2016-8633" }, { "category": "external", "summary": "SUSE Bug 1008833 for CVE-2016-8633", "url": "https://bugzilla.suse.com/1008833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-8633" }, { "cve": "CVE-2016-8646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8646" } ], "notes": [ { "category": "general", "text": "The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8646", "url": "https://www.suse.com/security/cve/CVE-2016-8646" }, { "category": "external", "summary": "SUSE Bug 1010150 for CVE-2016-8646", "url": "https://bugzilla.suse.com/1010150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-8646" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2016-9555" }, { "cve": "CVE-2016-9685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9685" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9685", "url": "https://www.suse.com/security/cve/CVE-2016-9685" }, { "category": "external", "summary": "SUSE Bug 1012832 for CVE-2016-9685", "url": "https://bugzilla.suse.com/1012832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-9685" }, { "cve": "CVE-2016-9756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9756" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9756", "url": "https://www.suse.com/security/cve/CVE-2016-9756" }, { "category": "external", "summary": "SUSE Bug 1013038 for CVE-2016-9756", "url": "https://bugzilla.suse.com/1013038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-9756" }, { "cve": "CVE-2016-9793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9793" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9793", "url": "https://www.suse.com/security/cve/CVE-2016-9793" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-9793" }, { "cve": "CVE-2017-5551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5551" } ], "notes": [ { "category": "general", "text": "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5551", "url": "https://www.suse.com/security/cve/CVE-2017-5551" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2017-5551", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2017-5551", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2017-5551" } ] }
suse-su-2016:1985-1
Vulnerability from csaf_suse
Published
2016-08-08 14:55
Modified
2016-08-08 14:55
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2016-3707: The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, allowed remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file (bnc#980246).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
The following non-security bugs were fixed:
- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).
- ALSA: oxygen: add Xonar DGX support (bsc#982691).
- Assign correct ->can_queue value in hv_storvsc (bnc#969391)
- Delete patches.drivers/nvme-0165-Split-header-file-into-user-visible-and-kernel-.patch. SLE11-SP4 does not have uapi headers so move everything back to the original header (bnc#981231)
- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).
- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- KVM: x86: fix maintenance of guest/host xcr0 state (bsc#961518).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).
- NFS: Do not attempt to decode missing directory entries (bsc#980931).
- NFS: avoid deadlocks with loop-back mounted NFS filesystems (bsc#956491).
- NFS: avoid waiting at all in nfs_release_page when congested (bsc#956491).
- NFS: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).
- NFS: reduce access cache shrinker locking (bnc#866130).
- NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595).
- NFSv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).
- NVMe: Unify controller probe and resume (bsc#979347).
- RDMA/cxgb4: Configure 0B MRs to match HW implementation (bsc#909589).
- RDMA/cxgb4: Do not hang threads forever waiting on WR replies (bsc#909589).
- RDMA/cxgb4: Fix locking issue in process_mpa_request (bsc#909589).
- RDMA/cxgb4: Handle NET_XMIT return codes (bsc#909589).
- RDMA/cxgb4: Increase epd buff size for debug interface (bsc#909589).
- RDMA/cxgb4: Limit MRs to less than 8GB for T4/T5 devices (bsc#909589).
- RDMA/cxgb4: Serialize CQ event upcalls with CQ destruction (bsc#909589).
- RDMA/cxgb4: Wake up waiters after flushing the qp (bsc#909589).
- SCSI: Increase REPORT_LUNS timeout (bsc#971989).
- Update patches.drivers/nvme-0265-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.
- Update patches.fixes/bnx2x-Alloc-4k-fragment-for-each-rx-ring-buffer-elem.patch (bsc#953369 bsc#975358).
- bridge: superfluous skb->nfct check in br_nf_dev_queue_xmit (bsc#982544).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).
- enic: set netdev->vlan_features (bsc#966245).
- fcoe: fix reset of fip selection time (bsc#974787).
- hid-elo: kill not flush the work (bnc#982532).
- ipc,sem: fix use after free on IPC_RMID after a task using same semaphore set exits (bsc#967914).
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- ipv4: fix ineffective source address selection (bsc#980788).
- ipvs: count pre-established TCP states as active (bsc#970114).
- iucv: call skb_linearize() when needed (bnc#979915, LTC#141240).
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).
- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- mm/vmscan.c: avoid throttling reclaim for loop-back nfsd threads (bsc#956491).
- mm: Fix DIF failures on ext3 filesystems (bsc#971030).
- net/qlge: Avoids recursive EEH error (bsc#954847).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- nvme: fix max_segments integer truncation (bsc#676471).
- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).
- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).
- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).
- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).
- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 855c7ce885fd412ce2a25ccc12a46e565c83f235.
- s390/dasd: prevent incorrect length error under z/VM after PAV changes (bnc#968500, LTC#136670).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456).
- s390/pci: add extra padding to function measurement block (bnc#968500, LTC#139445).
- s390/pci: enforce fmb page boundary rule (bnc#968500, LTC#139445).
- s390/pci: extract software counters from fmb (bnc#968500, LTC#139445).
- s390/pci: fix use after free in dma_init (bnc#979915, LTC#141626).
- s390/pci: remove pdev pointer from arch data (bnc#968500, LTC#139444).
- s390/pci_dma: fix DMA table corruption with > 4 TB main memory (bnc#968500, LTC#139401).
- s390/pci_dma: handle dma table failures (bnc#968500, LTC#139442).
- s390/pci_dma: improve debugging of errors during dma map (bnc#968500, LTC#139442).
- s390/pci_dma: unify label of invalid translation table entries (bnc#968500, LTC#139442).
- s390/spinlock: avoid yield to non existent cpu (bnc#968500, LTC#141106).
- s390: fix test_fp_ctl inline assembly contraints (bnc#979915, LTC#143138).
- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).
- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).
- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).
- veth: do not modify ip_summed (bsc#969149).
- vgaarb: Add more context to error messages (bsc#976868).
- virtio_scsi: Implement eh_timed_out callback (bsc#936530).
- x86, kvm: fix kvm's usage of kernel_fpu_begin/end() (bsc#961518).
- x86, kvm: use kernel_fpu_begin/end() in kvm_load/put_guest_fpu() (bsc#961518).
- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
Patchnames
slertesp4-linux-kernel-12681
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).\n- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \\0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).\n- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).\n- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).\n- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).\n- CVE-2016-3707: The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, allowed remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file (bnc#980246).\n- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).\n- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).\n- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).\n\nThe following non-security bugs were fixed:\n- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).\n- ALSA: oxygen: add Xonar DGX support (bsc#982691).\n- Assign correct -\u003ecan_queue value in hv_storvsc (bnc#969391)\n- Delete patches.drivers/nvme-0165-Split-header-file-into-user-visible-and-kernel-.patch. SLE11-SP4 does not have uapi headers so move everything back to the original header (bnc#981231)\n- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).\n- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)\n- KVM: x86: fix maintenance of guest/host xcr0 state (bsc#961518).\n- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).\n- NFS: Do not attempt to decode missing directory entries (bsc#980931).\n- NFS: avoid deadlocks with loop-back mounted NFS filesystems (bsc#956491).\n- NFS: avoid waiting at all in nfs_release_page when congested (bsc#956491).\n- NFS: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).\n- NFS: reduce access cache shrinker locking (bnc#866130).\n- NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595).\n- NFSv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).\n- NVMe: Unify controller probe and resume (bsc#979347).\n- RDMA/cxgb4: Configure 0B MRs to match HW implementation (bsc#909589).\n- RDMA/cxgb4: Do not hang threads forever waiting on WR replies (bsc#909589).\n- RDMA/cxgb4: Fix locking issue in process_mpa_request (bsc#909589).\n- RDMA/cxgb4: Handle NET_XMIT return codes (bsc#909589).\n- RDMA/cxgb4: Increase epd buff size for debug interface (bsc#909589).\n- RDMA/cxgb4: Limit MRs to less than 8GB for T4/T5 devices (bsc#909589).\n- RDMA/cxgb4: Serialize CQ event upcalls with CQ destruction (bsc#909589).\n- RDMA/cxgb4: Wake up waiters after flushing the qp (bsc#909589).\n- SCSI: Increase REPORT_LUNS timeout (bsc#971989).\n- Update patches.drivers/nvme-0265-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.\n- Update patches.fixes/bnx2x-Alloc-4k-fragment-for-each-rx-ring-buffer-elem.patch (bsc#953369 bsc#975358).\n- bridge: superfluous skb-\u003enfct check in br_nf_dev_queue_xmit (bsc#982544).\n- cgroups: do not attach task to subsystem if migration failed (bnc#979274).\n- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).\n- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).\n- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).\n- enic: set netdev-\u003evlan_features (bsc#966245).\n- fcoe: fix reset of fip selection time (bsc#974787).\n- hid-elo: kill not flush the work (bnc#982532).\n- ipc,sem: fix use after free on IPC_RMID after a task using same semaphore set exits (bsc#967914).\n- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).\n- ipv4: fix ineffective source address selection (bsc#980788).\n- ipvs: count pre-established TCP states as active (bsc#970114).\n- iucv: call skb_linearize() when needed (bnc#979915, LTC#141240).\n- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).\n- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).\n- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).\n- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).\n- mm/vmscan.c: avoid throttling reclaim for loop-back nfsd threads (bsc#956491).\n- mm: Fix DIF failures on ext3 filesystems (bsc#971030).\n- net/qlge: Avoids recursive EEH error (bsc#954847).\n- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).\n- netfilter: bridge: do not leak skb in error paths (bsc#982544).\n- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).\n- nvme: fix max_segments integer truncation (bsc#676471).\n- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).\n- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).\n- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).\n- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).\n- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 855c7ce885fd412ce2a25ccc12a46e565c83f235.\n- s390/dasd: prevent incorrect length error under z/VM after PAV changes (bnc#968500, LTC#136670).\n- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456).\n- s390/pci: add extra padding to function measurement block (bnc#968500, LTC#139445).\n- s390/pci: enforce fmb page boundary rule (bnc#968500, LTC#139445).\n- s390/pci: extract software counters from fmb (bnc#968500, LTC#139445).\n- s390/pci: fix use after free in dma_init (bnc#979915, LTC#141626).\n- s390/pci: remove pdev pointer from arch data (bnc#968500, LTC#139444).\n- s390/pci_dma: fix DMA table corruption with \u003e 4 TB main memory (bnc#968500, LTC#139401).\n- s390/pci_dma: handle dma table failures (bnc#968500, LTC#139442).\n- s390/pci_dma: improve debugging of errors during dma map (bnc#968500, LTC#139442).\n- s390/pci_dma: unify label of invalid translation table entries (bnc#968500, LTC#139442).\n- s390/spinlock: avoid yield to non existent cpu (bnc#968500, LTC#141106).\n- s390: fix test_fp_ctl inline assembly contraints (bnc#979915, LTC#143138).\n- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).\n- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).\n- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).\n- veth: do not modify ip_summed (bsc#969149).\n- vgaarb: Add more context to error messages (bsc#976868).\n- virtio_scsi: Implement eh_timed_out callback (bsc#936530).\n- x86, kvm: fix kvm\u0027s usage of kernel_fpu_begin/end() (bsc#961518).\n- x86, kvm: use kernel_fpu_begin/end() in kvm_load/put_guest_fpu() (bsc#961518).\n- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp4-linux-kernel-12681", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1985-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1985-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161985-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1985-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" }, { "category": "self", "summary": "SUSE Bug 676471", "url": "https://bugzilla.suse.com/676471" }, { "category": "self", "summary": "SUSE Bug 866130", "url": "https://bugzilla.suse.com/866130" }, { "category": "self", "summary": "SUSE Bug 909589", "url": "https://bugzilla.suse.com/909589" }, { "category": "self", "summary": "SUSE Bug 936530", "url": "https://bugzilla.suse.com/936530" }, { "category": "self", "summary": "SUSE Bug 944309", "url": "https://bugzilla.suse.com/944309" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 953369", "url": "https://bugzilla.suse.com/953369" }, { "category": "self", "summary": "SUSE Bug 954847", "url": "https://bugzilla.suse.com/954847" }, { "category": "self", "summary": "SUSE Bug 956491", "url": "https://bugzilla.suse.com/956491" }, { "category": "self", "summary": "SUSE Bug 957986", "url": "https://bugzilla.suse.com/957986" }, { "category": "self", "summary": "SUSE Bug 960857", "url": "https://bugzilla.suse.com/960857" }, { "category": "self", "summary": "SUSE Bug 961518", "url": "https://bugzilla.suse.com/961518" }, { "category": "self", "summary": "SUSE Bug 963762", "url": "https://bugzilla.suse.com/963762" }, { "category": "self", "summary": "SUSE Bug 966245", "url": "https://bugzilla.suse.com/966245" }, { "category": "self", "summary": "SUSE Bug 967914", "url": "https://bugzilla.suse.com/967914" }, { "category": "self", "summary": "SUSE Bug 968500", "url": "https://bugzilla.suse.com/968500" }, { "category": "self", "summary": "SUSE Bug 969149", "url": "https://bugzilla.suse.com/969149" }, { "category": "self", "summary": "SUSE Bug 969391", "url": "https://bugzilla.suse.com/969391" }, { "category": "self", "summary": "SUSE Bug 970114", "url": "https://bugzilla.suse.com/970114" }, { "category": "self", "summary": "SUSE Bug 971030", "url": "https://bugzilla.suse.com/971030" }, { "category": "self", "summary": "SUSE Bug 971126", "url": "https://bugzilla.suse.com/971126" }, { "category": "self", "summary": "SUSE Bug 971360", "url": "https://bugzilla.suse.com/971360" }, { "category": "self", "summary": "SUSE Bug 971446", "url": "https://bugzilla.suse.com/971446" }, { "category": "self", "summary": "SUSE Bug 971944", "url": "https://bugzilla.suse.com/971944" }, { "category": "self", "summary": "SUSE Bug 971947", "url": "https://bugzilla.suse.com/971947" }, { "category": "self", "summary": "SUSE Bug 971989", "url": "https://bugzilla.suse.com/971989" }, { "category": "self", "summary": "SUSE Bug 973378", "url": "https://bugzilla.suse.com/973378" }, { "category": "self", "summary": "SUSE Bug 974620", "url": "https://bugzilla.suse.com/974620" }, { "category": "self", "summary": "SUSE Bug 974646", "url": "https://bugzilla.suse.com/974646" }, { "category": "self", "summary": "SUSE Bug 974787", "url": "https://bugzilla.suse.com/974787" }, { "category": "self", "summary": "SUSE Bug 975358", "url": "https://bugzilla.suse.com/975358" }, { "category": "self", "summary": "SUSE Bug 976739", "url": "https://bugzilla.suse.com/976739" }, { "category": "self", "summary": "SUSE Bug 976868", "url": "https://bugzilla.suse.com/976868" }, { "category": "self", "summary": "SUSE Bug 978401", "url": "https://bugzilla.suse.com/978401" }, { "category": "self", "summary": "SUSE Bug 978821", "url": "https://bugzilla.suse.com/978821" }, { "category": "self", "summary": "SUSE Bug 978822", "url": "https://bugzilla.suse.com/978822" }, { "category": "self", "summary": "SUSE Bug 979213", "url": "https://bugzilla.suse.com/979213" }, { "category": "self", "summary": "SUSE Bug 979274", "url": "https://bugzilla.suse.com/979274" }, { "category": "self", "summary": "SUSE Bug 979347", "url": "https://bugzilla.suse.com/979347" }, { "category": "self", "summary": "SUSE Bug 979419", "url": "https://bugzilla.suse.com/979419" }, { "category": "self", "summary": "SUSE Bug 979548", "url": "https://bugzilla.suse.com/979548" }, { "category": "self", "summary": "SUSE Bug 979595", "url": "https://bugzilla.suse.com/979595" }, { "category": "self", "summary": "SUSE Bug 979867", "url": "https://bugzilla.suse.com/979867" }, { "category": "self", "summary": "SUSE Bug 979879", "url": "https://bugzilla.suse.com/979879" }, { "category": "self", "summary": "SUSE Bug 979915", "url": "https://bugzilla.suse.com/979915" }, { "category": "self", "summary": "SUSE Bug 980246", "url": "https://bugzilla.suse.com/980246" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 980725", "url": "https://bugzilla.suse.com/980725" }, { "category": "self", "summary": "SUSE Bug 980788", "url": "https://bugzilla.suse.com/980788" }, { "category": "self", "summary": "SUSE Bug 980931", "url": "https://bugzilla.suse.com/980931" }, { "category": "self", "summary": "SUSE Bug 981231", "url": "https://bugzilla.suse.com/981231" }, { "category": "self", "summary": "SUSE Bug 981267", "url": "https://bugzilla.suse.com/981267" }, { "category": "self", "summary": "SUSE Bug 982532", "url": "https://bugzilla.suse.com/982532" }, { "category": "self", "summary": "SUSE Bug 982544", "url": "https://bugzilla.suse.com/982544" }, { "category": "self", "summary": "SUSE Bug 982691", "url": "https://bugzilla.suse.com/982691" }, { "category": "self", "summary": "SUSE Bug 983143", "url": "https://bugzilla.suse.com/983143" }, { "category": "self", "summary": "SUSE Bug 983213", "url": "https://bugzilla.suse.com/983213" }, { "category": "self", "summary": "SUSE Bug 983721", "url": "https://bugzilla.suse.com/983721" }, { "category": "self", "summary": "SUSE Bug 984107", "url": "https://bugzilla.suse.com/984107" }, { "category": "self", "summary": "SUSE Bug 984755", "url": "https://bugzilla.suse.com/984755" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986572", "url": "https://bugzilla.suse.com/986572" }, { "category": "self", "summary": "SUSE Bug 988498", "url": "https://bugzilla.suse.com/988498" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7833 page", "url": "https://www.suse.com/security/cve/CVE-2015-7833/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2187 page", "url": "https://www.suse.com/security/cve/CVE-2016-2187/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3707 page", "url": "https://www.suse.com/security/cve/CVE-2016-3707/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4482 page", "url": "https://www.suse.com/security/cve/CVE-2016-4482/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4485 page", "url": "https://www.suse.com/security/cve/CVE-2016-4485/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4580 page", "url": "https://www.suse.com/security/cve/CVE-2016-4580/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4805 page", "url": "https://www.suse.com/security/cve/CVE-2016-4805/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4913 page", "url": "https://www.suse.com/security/cve/CVE-2016-4913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-08-08T14:55:45Z", "generator": { "date": "2016-08-08T14:55:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1985-1", "initial_release_date": "2016-08-08T14:55:45Z", "revision_history": [ { "date": "2016-08-08T14:55:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-57.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-57.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-57.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-57.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-57.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-57.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-57.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-57.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-57.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-57.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-57.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-57.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-57.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-57.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-57.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-57.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-57.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-57.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-57.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-57.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7833" } ], "notes": [ { "category": "general", "text": "The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7833", "url": "https://www.suse.com/security/cve/CVE-2015-7833" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7833", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 950998 for CVE-2015-7833", "url": "https://bugzilla.suse.com/950998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2015-7833" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-2187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2187" } ], "notes": [ { "category": "general", "text": "The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2187", "url": "https://www.suse.com/security/cve/CVE-2016-2187" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2187", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971919 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971919" }, { "category": "external", "summary": "SUSE Bug 971944 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2016-2187" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-3707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3707" } ], "notes": [ { "category": "general", "text": "The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3707", "url": "https://www.suse.com/security/cve/CVE-2016-3707" }, { "category": "external", "summary": "SUSE Bug 980246 for CVE-2016-3707", "url": "https://bugzilla.suse.com/980246" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "important" } ], "title": "CVE-2016-3707" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4482", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4482" } ], "notes": [ { "category": "general", "text": "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4482", "url": "https://www.suse.com/security/cve/CVE-2016-4482" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4482", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978401 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978401" }, { "category": "external", "summary": "SUSE Bug 978445 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "low" } ], "title": "CVE-2016-4482" }, { "cve": "CVE-2016-4485", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4485" } ], "notes": [ { "category": "general", "text": "The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4485", "url": "https://www.suse.com/security/cve/CVE-2016-4485" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4485", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978821 for CVE-2016-4485", "url": "https://bugzilla.suse.com/978821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2016-4485" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "low" } ], "title": "CVE-2016-4486" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2016-4565" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4580" } ], "notes": [ { "category": "general", "text": "The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4580", "url": "https://www.suse.com/security/cve/CVE-2016-4580" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4580", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 981267 for CVE-2016-4580", "url": "https://bugzilla.suse.com/981267" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4580", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "low" } ], "title": "CVE-2016-4580" }, { "cve": "CVE-2016-4805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4805" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4805", "url": "https://www.suse.com/security/cve/CVE-2016-4805" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 980371 for CVE-2016-4805", "url": "https://bugzilla.suse.com/980371" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "low" } ], "title": "CVE-2016-4805" }, { "cve": "CVE-2016-4913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4913" } ], "notes": [ { "category": "general", "text": "The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \\0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4913", "url": "https://www.suse.com/security/cve/CVE-2016-4913" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4913", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4913", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 980725 for CVE-2016-4913", "url": "https://bugzilla.suse.com/980725" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4913", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2016-4913" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2016-5244" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2016-5829" } ] }
suse-su-2016:1995-1
Vulnerability from csaf_suse
Published
2016-08-09 11:23
Modified
2016-08-09 11:23
Summary
Security update for Linux Kernel Live Patch 9 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 9 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.51-52_31 fixes several issues.
The following security bugs were fixed:
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).
- CVE-2015-8019: The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel did not accept a length argument, which allowed local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call (bsc#979078).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bsc#973570, bsc#955837).
Patchnames
SUSE-SLE-SAP-12-2016-1175,SUSE-SLE-SERVER-12-2016-1175
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 9 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-52_31 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).\n- CVE-2015-8019: The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel did not accept a length argument, which allowed local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call (bsc#979078).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).\n- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).\n- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bsc#973570, bsc#955837).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1175,SUSE-SLE-SERVER-12-2016-1175", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1995-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1995-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161995-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1995-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002182.html" }, { "category": "self", "summary": "SUSE Bug 955837", "url": "https://bugzilla.suse.com/955837" }, { "category": "self", "summary": "SUSE Bug 971793", "url": "https://bugzilla.suse.com/971793" }, { "category": "self", "summary": "SUSE Bug 973570", "url": "https://bugzilla.suse.com/973570" }, { "category": "self", "summary": "SUSE Bug 979064", "url": "https://bugzilla.suse.com/979064" }, { "category": "self", "summary": "SUSE Bug 979074", "url": "https://bugzilla.suse.com/979074" }, { "category": "self", "summary": "SUSE Bug 979078", "url": "https://bugzilla.suse.com/979078" }, { "category": "self", "summary": "SUSE Bug 980856", "url": "https://bugzilla.suse.com/980856" }, { "category": "self", "summary": "SUSE Bug 980883", "url": "https://bugzilla.suse.com/980883" }, { "category": "self", "summary": "SUSE Bug 983144", "url": "https://bugzilla.suse.com/983144" }, { "category": "self", "summary": "SUSE Bug 984764", "url": "https://bugzilla.suse.com/984764" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7446 page", "url": "https://www.suse.com/security/cve/CVE-2013-7446/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8019 page", "url": "https://www.suse.com/security/cve/CVE-2015-8019/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8816 page", "url": "https://www.suse.com/security/cve/CVE-2015-8816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" } ], "title": "Security update for Linux Kernel Live Patch 9 for SLE 12", "tracking": { "current_release_date": "2016-08-09T11:23:52Z", "generator": { "date": "2016-08-09T11:23:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1995-1", "initial_release_date": "2016-08-09T11:23:52Z", "revision_history": [ { "date": "2016-08-09T11:23:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "product_id": "kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "product_id": "kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7446" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7446", "url": "https://www.suse.com/security/cve/CVE-2013-7446" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-7446", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 955654 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955654" }, { "category": "external", "summary": "SUSE Bug 955837 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:52Z", "details": "moderate" } ], "title": "CVE-2013-7446" }, { "cve": "CVE-2015-8019", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8019" } ], "notes": [ { "category": "general", "text": "The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel 3.14.54 and 3.18.22 does not accept a length argument, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8019", "url": "https://www.suse.com/security/cve/CVE-2015-8019" }, { "category": "external", "summary": "SUSE Bug 1032268 for CVE-2015-8019", "url": "https://bugzilla.suse.com/1032268" }, { "category": "external", "summary": "SUSE Bug 951199 for CVE-2015-8019", "url": "https://bugzilla.suse.com/951199" }, { "category": "external", "summary": "SUSE Bug 952587 for CVE-2015-8019", "url": "https://bugzilla.suse.com/952587" }, { "category": "external", "summary": "SUSE Bug 979078 for CVE-2015-8019", "url": "https://bugzilla.suse.com/979078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:52Z", "details": "moderate" } ], "title": "CVE-2015-8019" }, { "cve": "CVE-2015-8816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8816" } ], "notes": [ { "category": "general", "text": "The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8816", "url": "https://www.suse.com/security/cve/CVE-2015-8816" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8816", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968010 for CVE-2015-8816", "url": "https://bugzilla.suse.com/968010" }, { "category": "external", "summary": "SUSE Bug 979064 for CVE-2015-8816", "url": "https://bugzilla.suse.com/979064" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:52Z", "details": "low" } ], "title": "CVE-2015-8816" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:52Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:52Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:52Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:52Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:52Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:23:52Z", "details": "moderate" } ], "title": "CVE-2016-4565" } ] }
suse-su-2016:2007-1
Vulnerability from csaf_suse
Published
2016-08-09 11:25
Modified
2016-08-09 11:25
Summary
Security update for Linux Kernel Live Patch 3 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 3 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.53-60_30 fixes the several issues.
These security issues were fixed:
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).
- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).
This non-security issue was fixed:
- bsc#973570: The fix for CVE-2013-7446 introduced a bug that could have possibly lead to a softlockup.
Patchnames
SUSE-SLE-Live-Patching-12-2016-1181
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 3 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.53-60_30 fixes the several issues.\n\nThese security issues were fixed:\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bsc#984764).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983144).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bsc#980883).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bsc#980856).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bsc#979074).\n- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bsc#979064).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bsc#971793).\n\nThis non-security issue was fixed:\n- bsc#973570: The fix for CVE-2013-7446 introduced a bug that could have possibly lead to a softlockup. \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1181", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2007-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2007-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162007-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2007-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002193.html" }, { "category": "self", "summary": "SUSE Bug 971793", "url": "https://bugzilla.suse.com/971793" }, { "category": "self", "summary": "SUSE Bug 973570", "url": "https://bugzilla.suse.com/973570" }, { "category": "self", "summary": "SUSE Bug 979064", "url": "https://bugzilla.suse.com/979064" }, { "category": "self", "summary": "SUSE Bug 979074", "url": "https://bugzilla.suse.com/979074" }, { "category": "self", "summary": "SUSE Bug 980856", "url": "https://bugzilla.suse.com/980856" }, { "category": "self", "summary": "SUSE Bug 980883", "url": "https://bugzilla.suse.com/980883" }, { "category": "self", "summary": "SUSE Bug 983144", "url": "https://bugzilla.suse.com/983144" }, { "category": "self", "summary": "SUSE Bug 984764", "url": "https://bugzilla.suse.com/984764" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7446 page", "url": "https://www.suse.com/security/cve/CVE-2013-7446/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8816 page", "url": "https://www.suse.com/security/cve/CVE-2015-8816/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" } ], "title": "Security update for Linux Kernel Live Patch 3 for SLE 12 SP1", "tracking": { "current_release_date": "2016-08-09T11:25:25Z", "generator": { "date": "2016-08-09T11:25:25Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2007-1", "initial_release_date": "2016-08-09T11:25:25Z", "revision_history": [ { "date": "2016-08-09T11:25:25Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7446", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7446" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7446", "url": "https://www.suse.com/security/cve/CVE-2013-7446" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-7446", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 955654 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955654" }, { "category": "external", "summary": "SUSE Bug 955837 for CVE-2013-7446", "url": "https://bugzilla.suse.com/955837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:25Z", "details": "moderate" } ], "title": "CVE-2013-7446" }, { "cve": "CVE-2015-8816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8816" } ], "notes": [ { "category": "general", "text": "The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8816", "url": "https://www.suse.com/security/cve/CVE-2015-8816" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8816", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 968010 for CVE-2015-8816", "url": "https://bugzilla.suse.com/968010" }, { "category": "external", "summary": "SUSE Bug 979064 for CVE-2015-8816", "url": "https://bugzilla.suse.com/979064" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:25Z", "details": "low" } ], "title": "CVE-2015-8816" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:25Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:25Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:25Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:25Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:25Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T11:25:25Z", "details": "moderate" } ], "title": "CVE-2016-4565" } ] }
gsd-2016-1583
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2016-1583", "description": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "id": "GSD-2016-1583", "references": [ "https://www.suse.com/security/cve/CVE-2016-1583.html", "https://www.debian.org/security/2016/dsa-3607", "https://access.redhat.com/errata/RHSA-2017:2760", "https://access.redhat.com/errata/RHSA-2016:2766", "https://access.redhat.com/errata/RHSA-2016:2124", "https://ubuntu.com/security/CVE-2016-1583", "https://advisories.mageia.org/CVE-2016-1583.html", "https://linux.oracle.com/cve/CVE-2016-1583.html", "https://packetstormsecurity.com/files/cve/CVE-2016-1583" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-1583" ], "details": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "id": "GSD-2016-1583", "modified": "2023-12-13T01:21:24.816067Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "ID": "CVE-2016-1583", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3006-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3006-1" }, { "name": "USN-3004-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3004-1" }, { "name": "SUSE-SU-2016:2010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" }, { "name": "https://github.com/torvalds/linux/commit/f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d" }, { "name": "RHSA-2016:2766", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2766.html" }, { "name": "USN-3001-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3001-1" }, { "name": "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3", "refsource": "CONFIRM", "url": "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3" }, { "name": "SUSE-SU-2016:1696", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d" }, { "name": "SUSE-SU-2016:1994", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" }, { "name": "39992", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/39992/" }, { "name": "SUSE-SU-2016:1961", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" }, { "name": "USN-3005-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3005-1" }, { "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=836", "refsource": "MISC", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=836" }, { "name": "SUSE-SU-2016:1985", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" }, { "name": "91157", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91157" }, { "name": "openSUSE-SU-2016:2184", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" }, { "name": "USN-2999-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2999-1" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87" }, { "name": "SUSE-SU-2016:2006", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" }, { "name": "[oss-security] 20160610 [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/06/10/8" }, { "name": "SUSE-SU-2016:2014", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" }, { "name": "openSUSE-SU-2016:1641", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" }, { "name": "USN-2997-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2997-1" }, { "name": "USN-3000-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3000-1" }, { "name": "https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b" }, { "name": "DSA-3607", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3607" }, { "name": "1036763", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036763" }, { "name": "https://github.com/torvalds/linux/commit/2f36db71009304b3f0b95afacd8eba1f9f046b87", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/2f36db71009304b3f0b95afacd8eba1f9f046b87" }, { "name": "USN-3002-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3002-1" }, { "name": "USN-2996-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2996-1" }, { "name": "SUSE-SU-2016:1672", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" }, { "name": "SUSE-SU-2016:2009", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" }, { "name": "SUSE-SU-2016:1596", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00027.html" }, { "name": "RHSA-2017:2760", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2760" }, { "name": "SUSE-SU-2016:2005", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" }, { "name": "SUSE-SU-2016:2007", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" }, { "name": "USN-3007-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3007-1" }, { "name": "SUSE-SU-2016:2000", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" }, { "name": "RHSA-2016:2124", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html" }, { "name": "USN-3003-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3003-1" }, { "name": "SUSE-SU-2016:1995", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" }, { "name": "SUSE-SU-2016:2105", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" }, { "name": "[oss-security] 20160622 Re: [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/06/22/1" }, { "name": "SUSE-SU-2016:2002", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721" }, { "name": "USN-2998-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2998-1" }, { "name": "http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html" }, { "name": "USN-3008-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3008-1" }, { "name": "SUSE-SU-2016:1937", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.18.54", "versionStartIncluding": "2.6.19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.4.14", "versionStartIncluding": "3.19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.6.3", "versionStartIncluding": "4.5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "ID": "CVE-2016-1583" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/2f36db71009304b3f0b95afacd8eba1f9f046b87", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://github.com/torvalds/linux/commit/2f36db71009304b3f0b95afacd8eba1f9f046b87" }, { "name": "https://github.com/torvalds/linux/commit/f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://github.com/torvalds/linux/commit/f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d" }, { "name": "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3" }, { "name": "[oss-security] 20160622 Re: [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/22/1" }, { "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=836", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=836" }, { "name": "[oss-security] 20160610 [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/10/8" }, { "name": "USN-2997-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2997-1" }, { "name": "USN-2996-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2996-1" }, { "name": "USN-3002-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3002-1" }, { "name": "USN-3001-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3001-1" }, { "name": "USN-3004-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3004-1" }, { "name": "USN-3000-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3000-1" }, { "name": "USN-2998-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2998-1" }, { "name": "USN-3003-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3003-1" }, { "name": "39992", "refsource": "EXPLOIT-DB", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/39992/" }, { "name": "http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html" }, { "name": "USN-3005-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3005-1" }, { "name": "USN-3006-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3006-1" }, { "name": "USN-2999-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2999-1" }, { "name": "SUSE-SU-2016:1596", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00027.html" }, { "name": "USN-3007-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3007-1" }, { "name": "SUSE-SU-2016:1672", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" }, { "name": "SUSE-SU-2016:1696", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" }, { "name": "USN-3008-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3008-1" }, { "name": "SUSE-SU-2016:1937", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" }, { "name": "SUSE-SU-2016:1995", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" }, { "name": "SUSE-SU-2016:2000", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" }, { "name": "SUSE-SU-2016:2002", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" }, { "name": "DSA-3607", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3607" }, { "name": "SUSE-SU-2016:1961", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" }, { "name": "91157", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91157" }, { "name": "SUSE-SU-2016:2014", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" }, { "name": "SUSE-SU-2016:2006", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" }, { "name": "SUSE-SU-2016:2007", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" }, { "name": "SUSE-SU-2016:1985", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" }, { "name": "SUSE-SU-2016:2010", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" }, { "name": "openSUSE-SU-2016:1641", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" }, { "name": "openSUSE-SU-2016:2184", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" }, { "name": "SUSE-SU-2016:1994", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" }, { "name": "SUSE-SU-2016:2005", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" }, { "name": "SUSE-SU-2016:2105", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" }, { "name": "SUSE-SU-2016:2009", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" }, { "name": "1036763", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036763" }, { "name": "RHSA-2017:2760", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2760" }, { "name": "RHSA-2016:2766", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2766.html" }, { "name": "RHSA-2016:2124", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html" }, { "name": "https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-09-12T14:55Z", "publishedDate": "2016-06-27T10:59Z" } } }
opensuse-su-2024:10128-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-debug-4.8.13-1.1 on GA media
Notes
Title of the patch
kernel-debug-4.8.13-1.1 on GA media
Description of the patch
These are all security issues fixed in the kernel-debug-4.8.13-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10128
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-debug-4.8.13-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-debug-4.8.13-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10128", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10128-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2009-3939 page", "url": "https://www.suse.com/security/cve/CVE-2009-3939/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4026 page", "url": "https://www.suse.com/security/cve/CVE-2009-4026/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4027 page", "url": "https://www.suse.com/security/cve/CVE-2009-4027/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4131 page", "url": "https://www.suse.com/security/cve/CVE-2009-4131/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4138 page", "url": "https://www.suse.com/security/cve/CVE-2009-4138/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4536 page", "url": "https://www.suse.com/security/cve/CVE-2009-4536/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4538 page", "url": "https://www.suse.com/security/cve/CVE-2009-4538/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-1146 page", "url": "https://www.suse.com/security/cve/CVE-2010-1146/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-1436 page", "url": "https://www.suse.com/security/cve/CVE-2010-1436/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-1641 page", "url": "https://www.suse.com/security/cve/CVE-2010-1641/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2066 page", "url": "https://www.suse.com/security/cve/CVE-2010-2066/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2942 page", "url": "https://www.suse.com/security/cve/CVE-2010-2942/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2954 page", "url": "https://www.suse.com/security/cve/CVE-2010-2954/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2955 page", "url": "https://www.suse.com/security/cve/CVE-2010-2955/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3081 page", "url": "https://www.suse.com/security/cve/CVE-2010-3081/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3296 page", "url": "https://www.suse.com/security/cve/CVE-2010-3296/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3297 page", "url": "https://www.suse.com/security/cve/CVE-2010-3297/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3298 page", "url": "https://www.suse.com/security/cve/CVE-2010-3298/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3301 page", "url": "https://www.suse.com/security/cve/CVE-2010-3301/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3310 page", "url": "https://www.suse.com/security/cve/CVE-2010-3310/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-0711 page", "url": "https://www.suse.com/security/cve/CVE-2011-0711/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-0712 page", "url": "https://www.suse.com/security/cve/CVE-2011-0712/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1020 page", "url": "https://www.suse.com/security/cve/CVE-2011-1020/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1180 page", "url": "https://www.suse.com/security/cve/CVE-2011-1180/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1577 page", "url": "https://www.suse.com/security/cve/CVE-2011-1577/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1581 page", "url": "https://www.suse.com/security/cve/CVE-2011-1581/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-2203 page", "url": "https://www.suse.com/security/cve/CVE-2011-2203/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-4604 page", "url": "https://www.suse.com/security/cve/CVE-2011-4604/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-0056 page", "url": "https://www.suse.com/security/cve/CVE-2012-0056/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-3412 page", "url": "https://www.suse.com/security/cve/CVE-2012-3412/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-3520 page", "url": "https://www.suse.com/security/cve/CVE-2012-3520/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0160 page", "url": "https://www.suse.com/security/cve/CVE-2013-0160/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0231 page", "url": "https://www.suse.com/security/cve/CVE-2013-0231/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0913 page", "url": "https://www.suse.com/security/cve/CVE-2013-0913/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2850 page", "url": "https://www.suse.com/security/cve/CVE-2013-2850/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0038 page", "url": "https://www.suse.com/security/cve/CVE-2014-0038/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0196 page", "url": "https://www.suse.com/security/cve/CVE-2014-0196/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0691 page", "url": "https://www.suse.com/security/cve/CVE-2014-0691/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8133 page", "url": "https://www.suse.com/security/cve/CVE-2014-8133/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1333 page", "url": "https://www.suse.com/security/cve/CVE-2015-1333/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7550 page", "url": "https://www.suse.com/security/cve/CVE-2015-7550/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7884 page", "url": "https://www.suse.com/security/cve/CVE-2015-7884/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7885 page", "url": "https://www.suse.com/security/cve/CVE-2015-7885/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8660 page", "url": "https://www.suse.com/security/cve/CVE-2015-8660/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0723 page", "url": "https://www.suse.com/security/cve/CVE-2016-0723/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0728 page", "url": "https://www.suse.com/security/cve/CVE-2016-0728/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1237 page", "url": "https://www.suse.com/security/cve/CVE-2016-1237/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2184 page", "url": "https://www.suse.com/security/cve/CVE-2016-2184/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2185 page", "url": "https://www.suse.com/security/cve/CVE-2016-2185/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2186 page", "url": "https://www.suse.com/security/cve/CVE-2016-2186/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2384 page", "url": "https://www.suse.com/security/cve/CVE-2016-2384/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3135 page", "url": "https://www.suse.com/security/cve/CVE-2016-3135/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3136 page", "url": "https://www.suse.com/security/cve/CVE-2016-3136/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3140 page", "url": "https://www.suse.com/security/cve/CVE-2016-3140/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3689 page", "url": "https://www.suse.com/security/cve/CVE-2016-3689/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3713 page", "url": "https://www.suse.com/security/cve/CVE-2016-3713/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4485 page", "url": "https://www.suse.com/security/cve/CVE-2016-4485/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4557 page", "url": "https://www.suse.com/security/cve/CVE-2016-4557/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4558 page", "url": "https://www.suse.com/security/cve/CVE-2016-4558/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4951 page", "url": "https://www.suse.com/security/cve/CVE-2016-4951/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4998 page", "url": "https://www.suse.com/security/cve/CVE-2016-4998/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6187 page", "url": "https://www.suse.com/security/cve/CVE-2016-6187/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6516 page", "url": "https://www.suse.com/security/cve/CVE-2016-6516/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7039 page", "url": "https://www.suse.com/security/cve/CVE-2016-7039/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7913 page", "url": "https://www.suse.com/security/cve/CVE-2016-7913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9576 page", "url": "https://www.suse.com/security/cve/CVE-2016-9576/" } ], "title": "kernel-debug-4.8.13-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10128-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-debug-4.8.13-1.1.aarch64", "product": { "name": "kernel-debug-4.8.13-1.1.aarch64", "product_id": "kernel-debug-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-debug-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-debug-base-4.8.13-1.1.aarch64", "product_id": "kernel-debug-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-debug-devel-4.8.13-1.1.aarch64", "product_id": "kernel-debug-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.8.13-1.1.aarch64", "product": { "name": "kernel-default-4.8.13-1.1.aarch64", "product_id": "kernel-default-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-default-base-4.8.13-1.1.aarch64", "product_id": "kernel-default-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-default-devel-4.8.13-1.1.aarch64", "product_id": "kernel-default-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-devel-4.8.13-1.1.aarch64", "product_id": "kernel-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-docs-4.8.13-1.1.aarch64", "product": { "name": "kernel-docs-4.8.13-1.1.aarch64", "product_id": "kernel-docs-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-docs-html-4.8.13-1.1.aarch64", "product": { "name": "kernel-docs-html-4.8.13-1.1.aarch64", "product_id": "kernel-docs-html-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.8.13-1.1.aarch64", "product": { "name": "kernel-docs-pdf-4.8.13-1.1.aarch64", "product_id": "kernel-docs-pdf-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-macros-4.8.13-1.1.aarch64", "product": { "name": "kernel-macros-4.8.13-1.1.aarch64", "product_id": "kernel-macros-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.8.13-1.1.aarch64", "product": { "name": "kernel-obs-build-4.8.13-1.1.aarch64", "product_id": "kernel-obs-build-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.8.13-1.1.aarch64", "product": { "name": "kernel-obs-qa-4.8.13-1.1.aarch64", "product_id": "kernel-obs-qa-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-pae-4.8.13-1.1.aarch64", "product": { "name": "kernel-pae-4.8.13-1.1.aarch64", "product_id": "kernel-pae-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-pae-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-pae-base-4.8.13-1.1.aarch64", "product_id": "kernel-pae-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-pae-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-pae-devel-4.8.13-1.1.aarch64", "product_id": "kernel-pae-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-source-4.8.13-1.1.aarch64", "product": { "name": "kernel-source-4.8.13-1.1.aarch64", "product_id": "kernel-source-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.8.13-1.1.aarch64", "product": { "name": "kernel-source-vanilla-4.8.13-1.1.aarch64", "product_id": "kernel-source-vanilla-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.8.13-1.1.aarch64", "product": { "name": "kernel-syms-4.8.13-1.1.aarch64", "product_id": "kernel-syms-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-syzkaller-4.8.13-1.1.aarch64", "product": { "name": "kernel-syzkaller-4.8.13-1.1.aarch64", "product_id": "kernel-syzkaller-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-syzkaller-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-syzkaller-base-4.8.13-1.1.aarch64", "product_id": "kernel-syzkaller-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-syzkaller-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-syzkaller-devel-4.8.13-1.1.aarch64", "product_id": "kernel-syzkaller-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.8.13-1.1.aarch64", "product": { "name": "kernel-vanilla-4.8.13-1.1.aarch64", "product_id": "kernel-vanilla-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-vanilla-base-4.8.13-1.1.aarch64", "product_id": "kernel-vanilla-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.8.13-1.1.aarch64", "product_id": "kernel-vanilla-devel-4.8.13-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.8.13-1.1.ppc64le", "product": { "name": "kernel-debug-4.8.13-1.1.ppc64le", "product_id": "kernel-debug-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-debug-base-4.8.13-1.1.ppc64le", "product_id": "kernel-debug-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-debug-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-debug-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.8.13-1.1.ppc64le", "product": { "name": "kernel-default-4.8.13-1.1.ppc64le", "product_id": "kernel-default-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-default-base-4.8.13-1.1.ppc64le", "product_id": "kernel-default-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-default-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-default-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-docs-4.8.13-1.1.ppc64le", "product": { "name": "kernel-docs-4.8.13-1.1.ppc64le", "product_id": "kernel-docs-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-docs-html-4.8.13-1.1.ppc64le", "product": { "name": "kernel-docs-html-4.8.13-1.1.ppc64le", "product_id": "kernel-docs-html-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.8.13-1.1.ppc64le", "product": { "name": "kernel-docs-pdf-4.8.13-1.1.ppc64le", "product_id": "kernel-docs-pdf-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-macros-4.8.13-1.1.ppc64le", "product": { "name": "kernel-macros-4.8.13-1.1.ppc64le", "product_id": "kernel-macros-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.8.13-1.1.ppc64le", "product": { "name": "kernel-obs-build-4.8.13-1.1.ppc64le", "product_id": "kernel-obs-build-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.8.13-1.1.ppc64le", "product": { "name": "kernel-obs-qa-4.8.13-1.1.ppc64le", "product_id": "kernel-obs-qa-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-pae-4.8.13-1.1.ppc64le", "product": { "name": "kernel-pae-4.8.13-1.1.ppc64le", "product_id": "kernel-pae-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-pae-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-pae-base-4.8.13-1.1.ppc64le", "product_id": "kernel-pae-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-pae-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-pae-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-pae-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-source-4.8.13-1.1.ppc64le", "product": { "name": "kernel-source-4.8.13-1.1.ppc64le", "product_id": "kernel-source-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.8.13-1.1.ppc64le", "product": { "name": "kernel-source-vanilla-4.8.13-1.1.ppc64le", "product_id": "kernel-source-vanilla-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.8.13-1.1.ppc64le", "product": { "name": "kernel-syms-4.8.13-1.1.ppc64le", "product_id": "kernel-syms-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syzkaller-4.8.13-1.1.ppc64le", "product": { "name": "kernel-syzkaller-4.8.13-1.1.ppc64le", "product_id": "kernel-syzkaller-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syzkaller-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-syzkaller-base-4.8.13-1.1.ppc64le", "product_id": "kernel-syzkaller-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.8.13-1.1.ppc64le", "product": { "name": "kernel-vanilla-4.8.13-1.1.ppc64le", "product_id": "kernel-vanilla-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.8.13-1.1.ppc64le", "product_id": "kernel-vanilla-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-vanilla-devel-4.8.13-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.8.13-1.1.s390x", "product": { "name": "kernel-debug-4.8.13-1.1.s390x", "product_id": "kernel-debug-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-debug-base-4.8.13-1.1.s390x", "product": { "name": "kernel-debug-base-4.8.13-1.1.s390x", "product_id": "kernel-debug-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-debug-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-debug-devel-4.8.13-1.1.s390x", "product_id": "kernel-debug-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.8.13-1.1.s390x", "product": { "name": "kernel-default-4.8.13-1.1.s390x", "product_id": "kernel-default-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.8.13-1.1.s390x", "product": { "name": "kernel-default-base-4.8.13-1.1.s390x", "product_id": "kernel-default-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-default-devel-4.8.13-1.1.s390x", "product_id": "kernel-default-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-devel-4.8.13-1.1.s390x", "product_id": "kernel-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-docs-4.8.13-1.1.s390x", "product": { "name": "kernel-docs-4.8.13-1.1.s390x", "product_id": "kernel-docs-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-docs-html-4.8.13-1.1.s390x", "product": { "name": "kernel-docs-html-4.8.13-1.1.s390x", "product_id": "kernel-docs-html-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.8.13-1.1.s390x", "product": { "name": "kernel-docs-pdf-4.8.13-1.1.s390x", "product_id": "kernel-docs-pdf-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-macros-4.8.13-1.1.s390x", "product": { "name": "kernel-macros-4.8.13-1.1.s390x", "product_id": "kernel-macros-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.8.13-1.1.s390x", "product": { "name": "kernel-obs-build-4.8.13-1.1.s390x", "product_id": "kernel-obs-build-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.8.13-1.1.s390x", "product": { "name": "kernel-obs-qa-4.8.13-1.1.s390x", "product_id": "kernel-obs-qa-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-pae-4.8.13-1.1.s390x", "product": { "name": "kernel-pae-4.8.13-1.1.s390x", "product_id": "kernel-pae-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-pae-base-4.8.13-1.1.s390x", "product": { "name": "kernel-pae-base-4.8.13-1.1.s390x", "product_id": "kernel-pae-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-pae-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-pae-devel-4.8.13-1.1.s390x", "product_id": "kernel-pae-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-source-4.8.13-1.1.s390x", "product": { "name": "kernel-source-4.8.13-1.1.s390x", "product_id": "kernel-source-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.8.13-1.1.s390x", "product": { "name": "kernel-source-vanilla-4.8.13-1.1.s390x", "product_id": "kernel-source-vanilla-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.8.13-1.1.s390x", "product": { "name": "kernel-syms-4.8.13-1.1.s390x", "product_id": "kernel-syms-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-syzkaller-4.8.13-1.1.s390x", "product": { "name": "kernel-syzkaller-4.8.13-1.1.s390x", "product_id": "kernel-syzkaller-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-syzkaller-base-4.8.13-1.1.s390x", "product": { "name": "kernel-syzkaller-base-4.8.13-1.1.s390x", "product_id": "kernel-syzkaller-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-syzkaller-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-syzkaller-devel-4.8.13-1.1.s390x", "product_id": "kernel-syzkaller-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.8.13-1.1.s390x", "product": { "name": "kernel-vanilla-4.8.13-1.1.s390x", "product_id": "kernel-vanilla-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.8.13-1.1.s390x", "product": { "name": "kernel-vanilla-base-4.8.13-1.1.s390x", "product_id": "kernel-vanilla-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-vanilla-devel-4.8.13-1.1.s390x", "product_id": "kernel-vanilla-devel-4.8.13-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.8.13-1.1.x86_64", "product": { "name": "kernel-debug-4.8.13-1.1.x86_64", "product_id": "kernel-debug-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-debug-base-4.8.13-1.1.x86_64", "product_id": "kernel-debug-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-debug-devel-4.8.13-1.1.x86_64", "product_id": "kernel-debug-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.8.13-1.1.x86_64", "product": { "name": "kernel-default-4.8.13-1.1.x86_64", "product_id": "kernel-default-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-default-base-4.8.13-1.1.x86_64", "product_id": "kernel-default-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-default-devel-4.8.13-1.1.x86_64", "product_id": "kernel-default-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-devel-4.8.13-1.1.x86_64", "product_id": "kernel-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-docs-4.8.13-1.1.x86_64", "product": { "name": "kernel-docs-4.8.13-1.1.x86_64", "product_id": "kernel-docs-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-docs-html-4.8.13-1.1.x86_64", "product": { "name": "kernel-docs-html-4.8.13-1.1.x86_64", "product_id": "kernel-docs-html-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.8.13-1.1.x86_64", "product": { "name": "kernel-docs-pdf-4.8.13-1.1.x86_64", "product_id": "kernel-docs-pdf-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-macros-4.8.13-1.1.x86_64", "product": { "name": "kernel-macros-4.8.13-1.1.x86_64", "product_id": "kernel-macros-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.8.13-1.1.x86_64", "product": { "name": "kernel-obs-build-4.8.13-1.1.x86_64", "product_id": "kernel-obs-build-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.8.13-1.1.x86_64", "product": { "name": "kernel-obs-qa-4.8.13-1.1.x86_64", "product_id": "kernel-obs-qa-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-pae-4.8.13-1.1.x86_64", "product": { "name": "kernel-pae-4.8.13-1.1.x86_64", "product_id": "kernel-pae-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-pae-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-pae-base-4.8.13-1.1.x86_64", "product_id": "kernel-pae-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-pae-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-pae-devel-4.8.13-1.1.x86_64", "product_id": "kernel-pae-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-4.8.13-1.1.x86_64", "product": { "name": "kernel-source-4.8.13-1.1.x86_64", "product_id": "kernel-source-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.8.13-1.1.x86_64", "product": { "name": "kernel-source-vanilla-4.8.13-1.1.x86_64", "product_id": "kernel-source-vanilla-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.8.13-1.1.x86_64", "product": { "name": "kernel-syms-4.8.13-1.1.x86_64", "product_id": "kernel-syms-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-syzkaller-4.8.13-1.1.x86_64", "product": { "name": "kernel-syzkaller-4.8.13-1.1.x86_64", "product_id": "kernel-syzkaller-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-syzkaller-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-syzkaller-base-4.8.13-1.1.x86_64", "product_id": "kernel-syzkaller-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-syzkaller-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-syzkaller-devel-4.8.13-1.1.x86_64", "product_id": "kernel-syzkaller-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.8.13-1.1.x86_64", "product": { "name": "kernel-vanilla-4.8.13-1.1.x86_64", "product_id": "kernel-vanilla-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-vanilla-base-4.8.13-1.1.x86_64", "product_id": "kernel-vanilla-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.8.13-1.1.x86_64", "product_id": "kernel-vanilla-devel-4.8.13-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64" }, "product_reference": "kernel-debug-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-debug-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x" }, "product_reference": "kernel-debug-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64" }, "product_reference": "kernel-debug-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-debug-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-debug-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-debug-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-debug-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-debug-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-debug-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-debug-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-debug-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64" }, "product_reference": "kernel-default-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-default-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x" }, "product_reference": "kernel-default-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64" }, "product_reference": "kernel-default-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-default-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-default-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-default-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-default-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-default-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-default-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-default-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-default-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64" }, "product_reference": "kernel-docs-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-docs-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x" }, "product_reference": "kernel-docs-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64" }, "product_reference": "kernel-docs-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64" }, "product_reference": "kernel-docs-html-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-docs-html-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x" }, "product_reference": "kernel-docs-html-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64" }, "product_reference": "kernel-docs-html-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-pdf-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64" }, "product_reference": "kernel-docs-pdf-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-pdf-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-docs-pdf-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-pdf-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x" }, "product_reference": "kernel-docs-pdf-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-pdf-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64" }, "product_reference": "kernel-docs-pdf-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64" }, "product_reference": "kernel-macros-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-macros-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x" }, "product_reference": "kernel-macros-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64" }, "product_reference": "kernel-macros-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64" }, "product_reference": "kernel-obs-build-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-obs-build-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x" }, "product_reference": "kernel-obs-build-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64" }, "product_reference": "kernel-obs-build-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64" }, "product_reference": "kernel-obs-qa-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-obs-qa-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x" }, "product_reference": "kernel-obs-qa-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64" }, "product_reference": "kernel-obs-qa-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64" }, "product_reference": "kernel-pae-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-pae-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x" }, "product_reference": "kernel-pae-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64" }, "product_reference": "kernel-pae-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-pae-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-pae-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-pae-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-pae-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-pae-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-pae-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-pae-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-pae-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64" }, "product_reference": "kernel-source-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-source-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x" }, "product_reference": "kernel-source-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64" }, "product_reference": "kernel-source-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64" }, "product_reference": "kernel-source-vanilla-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-source-vanilla-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x" }, "product_reference": "kernel-source-vanilla-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64" }, "product_reference": "kernel-source-vanilla-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64" }, "product_reference": "kernel-syms-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-syms-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x" }, "product_reference": "kernel-syms-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64" }, "product_reference": "kernel-syms-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64" }, "product_reference": "kernel-syzkaller-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-syzkaller-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x" }, "product_reference": "kernel-syzkaller-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64" }, "product_reference": "kernel-syzkaller-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-syzkaller-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-syzkaller-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-syzkaller-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-syzkaller-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-syzkaller-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-syzkaller-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-syzkaller-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64" }, "product_reference": "kernel-vanilla-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-vanilla-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x" }, "product_reference": "kernel-vanilla-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64" }, "product_reference": "kernel-vanilla-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-vanilla-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-vanilla-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-vanilla-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-vanilla-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-3939", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-3939" } ], "notes": [ { "category": "general", "text": "The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-3939", "url": "https://www.suse.com/security/cve/CVE-2009-3939" }, { "category": "external", "summary": "SUSE Bug 555173 for CVE-2009-3939", "url": "https://bugzilla.suse.com/555173" }, { "category": "external", "summary": "SUSE Bug 557180 for CVE-2009-3939", "url": "https://bugzilla.suse.com/557180" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-3939" }, { "cve": "CVE-2009-4026", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4026" } ], "notes": [ { "category": "general", "text": "The mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (panic) via a crafted Delete Block ACK (aka DELBA) packet, related to an erroneous \"code shuffling patch.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4026", "url": "https://www.suse.com/security/cve/CVE-2009-4026" }, { "category": "external", "summary": "SUSE Bug 558267 for CVE-2009-4026", "url": "https://bugzilla.suse.com/558267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-4026" }, { "cve": "CVE-2009-4027", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4027" } ], "notes": [ { "category": "general", "text": "Race condition in the mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (system crash) via a Delete Block ACK (aka DELBA) packet that triggers a certain state change in the absence of an aggregation session.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4027", "url": "https://www.suse.com/security/cve/CVE-2009-4027" }, { "category": "external", "summary": "SUSE Bug 558267 for CVE-2009-4027", "url": "https://bugzilla.suse.com/558267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-4027" }, { "cve": "CVE-2009-4131", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4131" } ], "notes": [ { "category": "general", "text": "The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel before 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4131", "url": "https://www.suse.com/security/cve/CVE-2009-4131" }, { "category": "external", "summary": "SUSE Bug 561018 for CVE-2009-4131", "url": "https://bugzilla.suse.com/561018" }, { "category": "external", "summary": "SUSE Bug 564380 for CVE-2009-4131", "url": "https://bugzilla.suse.com/564380" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-4131" }, { "cve": "CVE-2009-4138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4138" } ], "notes": [ { "category": "general", "text": "drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4138", "url": "https://www.suse.com/security/cve/CVE-2009-4138" }, { "category": "external", "summary": "SUSE Bug 564712 for CVE-2009-4138", "url": "https://bugzilla.suse.com/564712" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-4138" }, { "cve": "CVE-2009-4536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4536" } ], "notes": [ { "category": "general", "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4536", "url": "https://www.suse.com/security/cve/CVE-2009-4536" }, { "category": "external", "summary": "SUSE Bug 567376 for CVE-2009-4536", "url": "https://bugzilla.suse.com/567376" }, { "category": "external", "summary": "SUSE Bug 583434 for CVE-2009-4536", "url": "https://bugzilla.suse.com/583434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-4536" }, { "cve": "CVE-2009-4538", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4538" } ], "notes": [ { "category": "general", "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4538", "url": "https://www.suse.com/security/cve/CVE-2009-4538" }, { "category": "external", "summary": "SUSE Bug 567376 for CVE-2009-4538", "url": "https://bugzilla.suse.com/567376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2009-4538" }, { "cve": "CVE-2010-1146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-1146" } ], "notes": [ { "category": "general", "text": "The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exists, does not restrict read or write access to the .reiserfs_priv directory, which allows local users to gain privileges by modifying (1) extended attributes or (2) ACLs, as demonstrated by deleting a file under .reiserfs_priv/xattrs/.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-1146", "url": "https://www.suse.com/security/cve/CVE-2010-1146" }, { "category": "external", "summary": "SUSE Bug 593906 for CVE-2010-1146", "url": "https://bugzilla.suse.com/593906" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-1146" }, { "cve": "CVE-2010-1436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-1436" } ], "notes": [ { "category": "general", "text": "gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-1436", "url": "https://www.suse.com/security/cve/CVE-2010-1436" }, { "category": "external", "summary": "SUSE Bug 599957 for CVE-2010-1436", "url": "https://bugzilla.suse.com/599957" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-1436" }, { "cve": "CVE-2010-1641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-1641" } ], "notes": [ { "category": "general", "text": "The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-1641", "url": "https://www.suse.com/security/cve/CVE-2010-1641" }, { "category": "external", "summary": "SUSE Bug 608576 for CVE-2010-1641", "url": "https://bugzilla.suse.com/608576" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-1641" }, { "cve": "CVE-2010-2066", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2066" } ], "notes": [ { "category": "general", "text": "The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2066", "url": "https://www.suse.com/security/cve/CVE-2010-2066" }, { "category": "external", "summary": "SUSE Bug 612457 for CVE-2010-2066", "url": "https://bugzilla.suse.com/612457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2066" }, { "cve": "CVE-2010-2942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2942" } ], "notes": [ { "category": "general", "text": "The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2942", "url": "https://www.suse.com/security/cve/CVE-2010-2942" }, { "category": "external", "summary": "SUSE Bug 632309 for CVE-2010-2942", "url": "https://bugzilla.suse.com/632309" }, { "category": "external", "summary": "SUSE Bug 642324 for CVE-2010-2942", "url": "https://bugzilla.suse.com/642324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2942" }, { "cve": "CVE-2010-2954", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2954" } ], "notes": [ { "category": "general", "text": "The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2954", "url": "https://www.suse.com/security/cve/CVE-2010-2954" }, { "category": "external", "summary": "SUSE Bug 636112 for CVE-2010-2954", "url": "https://bugzilla.suse.com/636112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2954" }, { "cve": "CVE-2010-2955", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2955" } ], "notes": [ { "category": "general", "text": "The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2955", "url": "https://www.suse.com/security/cve/CVE-2010-2955" }, { "category": "external", "summary": "SUSE Bug 635413 for CVE-2010-2955", "url": "https://bugzilla.suse.com/635413" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2955" }, { "cve": "CVE-2010-3081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3081" } ], "notes": [ { "category": "general", "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3081", "url": "https://www.suse.com/security/cve/CVE-2010-3081" }, { "category": "external", "summary": "SUSE Bug 639709 for CVE-2010-3081", "url": "https://bugzilla.suse.com/639709" }, { "category": "external", "summary": "SUSE Bug 641575 for CVE-2010-3081", "url": "https://bugzilla.suse.com/641575" }, { "category": "external", "summary": "SUSE Bug 871595 for CVE-2010-3081", "url": "https://bugzilla.suse.com/871595" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2010-3081" }, { "cve": "CVE-2010-3296", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3296" } ], "notes": [ { "category": "general", "text": "The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3296", "url": "https://www.suse.com/security/cve/CVE-2010-3296" }, { "category": "external", "summary": "SUSE Bug 639481 for CVE-2010-3296", "url": "https://bugzilla.suse.com/639481" }, { "category": "external", "summary": "SUSE Bug 649187 for CVE-2010-3296", "url": "https://bugzilla.suse.com/649187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-3296" }, { "cve": "CVE-2010-3297", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3297" } ], "notes": [ { "category": "general", "text": "The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3297", "url": "https://www.suse.com/security/cve/CVE-2010-3297" }, { "category": "external", "summary": "SUSE Bug 639482 for CVE-2010-3297", "url": "https://bugzilla.suse.com/639482" }, { "category": "external", "summary": "SUSE Bug 649187 for CVE-2010-3297", "url": "https://bugzilla.suse.com/649187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-3297" }, { "cve": "CVE-2010-3298", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3298" } ], "notes": [ { "category": "general", "text": "The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3298", "url": "https://www.suse.com/security/cve/CVE-2010-3298" }, { "category": "external", "summary": "SUSE Bug 639483 for CVE-2010-3298", "url": "https://bugzilla.suse.com/639483" }, { "category": "external", "summary": "SUSE Bug 649187 for CVE-2010-3298", "url": "https://bugzilla.suse.com/649187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-3298" }, { "cve": "CVE-2010-3301", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3301" } ], "notes": [ { "category": "general", "text": "The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3301", "url": "https://www.suse.com/security/cve/CVE-2010-3301" }, { "category": "external", "summary": "SUSE Bug 639708 for CVE-2010-3301", "url": "https://bugzilla.suse.com/639708" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2010-3301" }, { "cve": "CVE-2010-3310", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3310" } ], "notes": [ { "category": "general", "text": "Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3310", "url": "https://www.suse.com/security/cve/CVE-2010-3310" }, { "category": "external", "summary": "SUSE Bug 640721 for CVE-2010-3310", "url": "https://bugzilla.suse.com/640721" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2010-3310" }, { "cve": "CVE-2011-0711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-0711" } ], "notes": [ { "category": "general", "text": "The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-0711", "url": "https://www.suse.com/security/cve/CVE-2011-0711" }, { "category": "external", "summary": "SUSE Bug 672505 for CVE-2011-0711", "url": "https://bugzilla.suse.com/672505" }, { "category": "external", "summary": "SUSE Bug 672524 for CVE-2011-0711", "url": "https://bugzilla.suse.com/672524" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-0711" }, { "cve": "CVE-2011-0712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-0712" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in the caiaq Native Instruments USB audio functionality in the Linux kernel before 2.6.38-rc4-next-20110215 might allow attackers to cause a denial of service or possibly have unspecified other impact via a long USB device name, related to (1) the snd_usb_caiaq_audio_init function in sound/usb/caiaq/audio.c and (2) the snd_usb_caiaq_midi_init function in sound/usb/caiaq/midi.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-0712", "url": "https://www.suse.com/security/cve/CVE-2011-0712" }, { "category": "external", "summary": "SUSE Bug 672499 for CVE-2011-0712", "url": "https://bugzilla.suse.com/672499" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-0712" }, { "cve": "CVE-2011-1020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1020" } ], "notes": [ { "category": "general", "text": "The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1020", "url": "https://www.suse.com/security/cve/CVE-2011-1020" }, { "category": "external", "summary": "SUSE Bug 674982 for CVE-2011-1020", "url": "https://bugzilla.suse.com/674982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-1020" }, { "cve": "CVE-2011-1180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1180" } ], "notes": [ { "category": "general", "text": "Multiple stack-based buffer overflows in the iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux kernel before 2.6.39 allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging connectivity to an IrDA infrared network and sending a large integer value for a (1) name length or (2) attribute length.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1180", "url": "https://www.suse.com/security/cve/CVE-2011-1180" }, { "category": "external", "summary": "SUSE Bug 681497 for CVE-2011-1180", "url": "https://bugzilla.suse.com/681497" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-1180" }, { "cve": "CVE-2011-1577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1577" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1577", "url": "https://www.suse.com/security/cve/CVE-2011-1577" }, { "category": "external", "summary": "SUSE Bug 687113 for CVE-2011-1577", "url": "https://bugzilla.suse.com/687113" }, { "category": "external", "summary": "SUSE Bug 692784 for CVE-2011-1577", "url": "https://bugzilla.suse.com/692784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-1577" }, { "cve": "CVE-2011-1581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1581" } ], "notes": [ { "category": "general", "text": "The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1581", "url": "https://www.suse.com/security/cve/CVE-2011-1581" }, { "category": "external", "summary": "SUSE Bug 687116 for CVE-2011-1581", "url": "https://bugzilla.suse.com/687116" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-1581" }, { "cve": "CVE-2011-2203", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-2203" } ], "notes": [ { "category": "general", "text": "The hfs_find_init function in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and Oops) by mounting an HFS file system with a malformed MDB extent record.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-2203", "url": "https://www.suse.com/security/cve/CVE-2011-2203" }, { "category": "external", "summary": "SUSE Bug 699709 for CVE-2011-2203", "url": "https://bugzilla.suse.com/699709" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2011-2203" }, { "cve": "CVE-2011-4604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-4604" } ], "notes": [ { "category": "general", "text": "The bat_socket_read function in net/batman-adv/icmp_socket.c in the Linux kernel before 3.3 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted batman-adv ICMP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-4604", "url": "https://www.suse.com/security/cve/CVE-2011-4604" }, { "category": "external", "summary": "SUSE Bug 736149 for CVE-2011-4604", "url": "https://bugzilla.suse.com/736149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2011-4604" }, { "cve": "CVE-2012-0056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-0056" } ], "notes": [ { "category": "general", "text": "The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/\u003cpid\u003e/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-0056", "url": "https://www.suse.com/security/cve/CVE-2012-0056" }, { "category": "external", "summary": "SUSE Bug 1171985 for CVE-2012-0056", "url": "https://bugzilla.suse.com/1171985" }, { "category": "external", "summary": "SUSE Bug 742028 for CVE-2012-0056", "url": "https://bugzilla.suse.com/742028" }, { "category": "external", "summary": "SUSE Bug 742279 for CVE-2012-0056", "url": "https://bugzilla.suse.com/742279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-0056" }, { "cve": "CVE-2012-3412", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-3412" } ], "notes": [ { "category": "general", "text": "The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-3412", "url": "https://www.suse.com/security/cve/CVE-2012-3412" }, { "category": "external", "summary": "SUSE Bug 774523 for CVE-2012-3412", "url": "https://bugzilla.suse.com/774523" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-3412" }, { "cve": "CVE-2012-3520", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-3520" } ], "notes": [ { "category": "general", "text": "The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-3520", "url": "https://www.suse.com/security/cve/CVE-2012-3520" }, { "category": "external", "summary": "SUSE Bug 776925 for CVE-2012-3520", "url": "https://bugzilla.suse.com/776925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2012-3520" }, { "cve": "CVE-2013-0160", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0160" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0160", "url": "https://www.suse.com/security/cve/CVE-2013-0160" }, { "category": "external", "summary": "SUSE Bug 797175 for CVE-2013-0160", "url": "https://bugzilla.suse.com/797175" }, { "category": "external", "summary": "SUSE Bug 841063 for CVE-2013-0160", "url": "https://bugzilla.suse.com/841063" }, { "category": "external", "summary": "SUSE Bug 871595 for CVE-2013-0160", "url": "https://bugzilla.suse.com/871595" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-0160" }, { "cve": "CVE-2013-0231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0231" } ], "notes": [ { "category": "general", "text": "The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some of these details are obtained from third party information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0231", "url": "https://www.suse.com/security/cve/CVE-2013-0231" }, { "category": "external", "summary": "SUSE Bug 801178 for CVE-2013-0231", "url": "https://bugzilla.suse.com/801178" }, { "category": "external", "summary": "SUSE Bug 841063 for CVE-2013-0231", "url": "https://bugzilla.suse.com/841063" }, { "category": "external", "summary": "SUSE Bug 871595 for CVE-2013-0231", "url": "https://bugzilla.suse.com/871595" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-0231" }, { "cve": "CVE-2013-0913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0913" } ], "notes": [ { "category": "general", "text": "Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0913", "url": "https://www.suse.com/security/cve/CVE-2013-0913" }, { "category": "external", "summary": "SUSE Bug 808829 for CVE-2013-0913", "url": "https://bugzilla.suse.com/808829" }, { "category": "external", "summary": "SUSE Bug 871595 for CVE-2013-0913", "url": "https://bugzilla.suse.com/871595" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-0913" }, { "cve": "CVE-2013-2850", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2850" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2850", "url": "https://www.suse.com/security/cve/CVE-2013-2850" }, { "category": "external", "summary": "SUSE Bug 821560 for CVE-2013-2850", "url": "https://bugzilla.suse.com/821560" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2850" }, { "cve": "CVE-2014-0038", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0038" } ], "notes": [ { "category": "general", "text": "The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0038", "url": "https://www.suse.com/security/cve/CVE-2014-0038" }, { "category": "external", "summary": "SUSE Bug 860993 for CVE-2014-0038", "url": "https://bugzilla.suse.com/860993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-0038" }, { "cve": "CVE-2014-0196", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0196" } ], "notes": [ { "category": "general", "text": "The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the \"LECHO \u0026 !OPOST\" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0196", "url": "https://www.suse.com/security/cve/CVE-2014-0196" }, { "category": "external", "summary": "SUSE Bug 871252 for CVE-2014-0196", "url": "https://bugzilla.suse.com/871252" }, { "category": "external", "summary": "SUSE Bug 875690 for CVE-2014-0196", "url": "https://bugzilla.suse.com/875690" }, { "category": "external", "summary": "SUSE Bug 877345 for CVE-2014-0196", "url": "https://bugzilla.suse.com/877345" }, { "category": "external", "summary": "SUSE Bug 879878 for CVE-2014-0196", "url": "https://bugzilla.suse.com/879878" }, { "category": "external", "summary": "SUSE Bug 933423 for CVE-2014-0196", "url": "https://bugzilla.suse.com/933423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-0196" }, { "cve": "CVE-2014-0691", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0691" } ], "notes": [ { "category": "general", "text": "Cisco WebEx Meetings Server before 1.1 uses meeting IDs with insufficient entropy, which makes it easier for remote attackers to bypass authentication and join arbitrary meetings without a password, aka Bug ID CSCuc79643.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0691", "url": "https://www.suse.com/security/cve/CVE-2014-0691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-0691" }, { "cve": "CVE-2014-8133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8133" } ], "notes": [ { "category": "general", "text": "arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8133", "url": "https://www.suse.com/security/cve/CVE-2014-8133" }, { "category": "external", "summary": "SUSE Bug 817142 for CVE-2014-8133", "url": "https://bugzilla.suse.com/817142" }, { "category": "external", "summary": "SUSE Bug 906545 for CVE-2014-8133", "url": "https://bugzilla.suse.com/906545" }, { "category": "external", "summary": "SUSE Bug 907818 for CVE-2014-8133", "url": "https://bugzilla.suse.com/907818" }, { "category": "external", "summary": "SUSE Bug 909077 for CVE-2014-8133", "url": "https://bugzilla.suse.com/909077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2014-8133" }, { "cve": "CVE-2015-1333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1333" } ], "notes": [ { "category": "general", "text": "Memory leak in the __key_link_end function in security/keys/keyring.c in the Linux kernel before 4.1.4 allows local users to cause a denial of service (memory consumption) via many add_key system calls that refer to existing keys.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1333", "url": "https://www.suse.com/security/cve/CVE-2015-1333" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2015-1333", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1185451 for CVE-2015-1333", "url": "https://bugzilla.suse.com/1185451" }, { "category": "external", "summary": "SUSE Bug 938645 for CVE-2015-1333", "url": "https://bugzilla.suse.com/938645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1333" }, { "cve": "CVE-2015-7550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7550" } ], "notes": [ { "category": "general", "text": "The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7550", "url": "https://www.suse.com/security/cve/CVE-2015-7550" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7550", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7550", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 958951 for CVE-2015-7550", "url": "https://bugzilla.suse.com/958951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7550" }, { "cve": "CVE-2015-7884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7884" } ], "notes": [ { "category": "general", "text": "The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7884", "url": "https://www.suse.com/security/cve/CVE-2015-7884" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2015-7884", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 951626 for CVE-2015-7884", "url": "https://bugzilla.suse.com/951626" }, { "category": "external", "summary": "SUSE Bug 951627 for CVE-2015-7884", "url": "https://bugzilla.suse.com/951627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7884" }, { "cve": "CVE-2015-7885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7885" } ], "notes": [ { "category": "general", "text": "The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7885", "url": "https://www.suse.com/security/cve/CVE-2015-7885" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2015-7885", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 951626 for CVE-2015-7885", "url": "https://bugzilla.suse.com/951626" }, { "category": "external", "summary": "SUSE Bug 951627 for CVE-2015-7885", "url": "https://bugzilla.suse.com/951627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7885" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-8539" }, { "cve": "CVE-2015-8660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8660" } ], "notes": [ { "category": "general", "text": "The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8660", "url": "https://www.suse.com/security/cve/CVE-2015-8660" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-8660", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 960281 for CVE-2015-8660", "url": "https://bugzilla.suse.com/960281" }, { "category": "external", "summary": "SUSE Bug 960329 for CVE-2015-8660", "url": "https://bugzilla.suse.com/960329" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-8660", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-8660" }, { "cve": "CVE-2016-0723", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0723" } ], "notes": [ { "category": "general", "text": "Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0723", "url": "https://www.suse.com/security/cve/CVE-2016-0723" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0723", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 961500 for CVE-2016-0723", "url": "https://bugzilla.suse.com/961500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-0723" }, { "cve": "CVE-2016-0728", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0728" } ], "notes": [ { "category": "general", "text": "The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0728", "url": "https://www.suse.com/security/cve/CVE-2016-0728" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2016-0728", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 962075 for CVE-2016-0728", "url": "https://bugzilla.suse.com/962075" }, { "category": "external", "summary": "SUSE Bug 962078 for CVE-2016-0728", "url": "https://bugzilla.suse.com/962078" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2016-0728", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0728" }, { "cve": "CVE-2016-1237", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1237" } ], "notes": [ { "category": "general", "text": "nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1237", "url": "https://www.suse.com/security/cve/CVE-2016-1237" }, { "category": "external", "summary": "SUSE Bug 986570 for CVE-2016-1237", "url": "https://bugzilla.suse.com/986570" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-1237" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2184" } ], "notes": [ { "category": "general", "text": "The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2184", "url": "https://www.suse.com/security/cve/CVE-2016-2184" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2184", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971125 for CVE-2016-2184", "url": "https://bugzilla.suse.com/971125" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2184" }, { "cve": "CVE-2016-2185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2185" } ], "notes": [ { "category": "general", "text": "The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2185", "url": "https://www.suse.com/security/cve/CVE-2016-2185" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2185", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971124 for CVE-2016-2185", "url": "https://bugzilla.suse.com/971124" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2185" }, { "cve": "CVE-2016-2186", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2186" } ], "notes": [ { "category": "general", "text": "The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2186", "url": "https://www.suse.com/security/cve/CVE-2016-2186" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2186", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970958 for CVE-2016-2186", "url": "https://bugzilla.suse.com/970958" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2186" }, { "cve": "CVE-2016-2384", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2384" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2384", "url": "https://www.suse.com/security/cve/CVE-2016-2384" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2384", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 966693 for CVE-2016-2384", "url": "https://bugzilla.suse.com/966693" }, { "category": "external", "summary": "SUSE Bug 967773 for CVE-2016-2384", "url": "https://bugzilla.suse.com/967773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2384" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-3135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3135" } ], "notes": [ { "category": "general", "text": "Integer overflow in the xt_alloc_table_info function in net/netfilter/x_tables.c in the Linux kernel through 4.5.2 on 32-bit platforms allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3135", "url": "https://www.suse.com/security/cve/CVE-2016-3135" }, { "category": "external", "summary": "SUSE Bug 970904 for CVE-2016-3135", "url": "https://bugzilla.suse.com/970904" }, { "category": "external", "summary": "SUSE Bug 971794 for CVE-2016-3135", "url": "https://bugzilla.suse.com/971794" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-3135" }, { "cve": "CVE-2016-3136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3136" } ], "notes": [ { "category": "general", "text": "The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3136", "url": "https://www.suse.com/security/cve/CVE-2016-3136" }, { "category": "external", "summary": "SUSE Bug 970955 for CVE-2016-3136", "url": "https://bugzilla.suse.com/970955" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3136" }, { "cve": "CVE-2016-3140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3140" } ], "notes": [ { "category": "general", "text": "The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3140", "url": "https://www.suse.com/security/cve/CVE-2016-3140" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3140", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970892 for CVE-2016-3140", "url": "https://bugzilla.suse.com/970892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3140" }, { "cve": "CVE-2016-3689", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3689" } ], "notes": [ { "category": "general", "text": "The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3689", "url": "https://www.suse.com/security/cve/CVE-2016-3689" }, { "category": "external", "summary": "SUSE Bug 971628 for CVE-2016-3689", "url": "https://bugzilla.suse.com/971628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3689" }, { "cve": "CVE-2016-3713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3713" } ], "notes": [ { "category": "general", "text": "The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3713", "url": "https://www.suse.com/security/cve/CVE-2016-3713" }, { "category": "external", "summary": "SUSE Bug 979715 for CVE-2016-3713", "url": "https://bugzilla.suse.com/979715" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-3713", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3713" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4485", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4485" } ], "notes": [ { "category": "general", "text": "The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4485", "url": "https://www.suse.com/security/cve/CVE-2016-4485" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4485", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978821 for CVE-2016-4485", "url": "https://bugzilla.suse.com/978821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4485" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4486" }, { "cve": "CVE-2016-4557", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4557" } ], "notes": [ { "category": "general", "text": "The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4557", "url": "https://www.suse.com/security/cve/CVE-2016-4557" }, { "category": "external", "summary": "SUSE Bug 979018 for CVE-2016-4557", "url": "https://bugzilla.suse.com/979018" }, { "category": "external", "summary": "SUSE Bug 979077 for CVE-2016-4557", "url": "https://bugzilla.suse.com/979077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4557" }, { "cve": "CVE-2016-4558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4558" } ], "notes": [ { "category": "general", "text": "The BPF subsystem in the Linux kernel before 4.5.5 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted application on (1) a system with more than 32 Gb of memory, related to the program reference count or (2) a 1 Tb system, related to the map reference count.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4558", "url": "https://www.suse.com/security/cve/CVE-2016-4558" }, { "category": "external", "summary": "SUSE Bug 979019 for CVE-2016-4558", "url": "https://bugzilla.suse.com/979019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4558" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4951", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4951" } ], "notes": [ { "category": "general", "text": "The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4951", "url": "https://www.suse.com/security/cve/CVE-2016-4951" }, { "category": "external", "summary": "SUSE Bug 981058 for CVE-2016-4951", "url": "https://bugzilla.suse.com/981058" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4951", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4951" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-4998", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4998" } ], "notes": [ { "category": "general", "text": "The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4998", "url": "https://www.suse.com/security/cve/CVE-2016-4998" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4998", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4998", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4998", "url": "https://bugzilla.suse.com/986365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4998" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5244" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6187" } ], "notes": [ { "category": "general", "text": "The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6187", "url": "https://www.suse.com/security/cve/CVE-2016-6187" }, { "category": "external", "summary": "SUSE Bug 988307 for CVE-2016-6187", "url": "https://bugzilla.suse.com/988307" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-6187" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6516" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_file_dedupe_range function in fs/ioctl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (heap-based buffer overflow) or possibly gain privileges by changing a certain count value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6516", "url": "https://www.suse.com/security/cve/CVE-2016-6516" }, { "category": "external", "summary": "SUSE Bug 991604 for CVE-2016-6516", "url": "https://bugzilla.suse.com/991604" }, { "category": "external", "summary": "SUSE Bug 991669 for CVE-2016-6516", "url": "https://bugzilla.suse.com/991669" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-6516" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7039", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7039" } ], "notes": [ { "category": "general", "text": "The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7039", "url": "https://www.suse.com/security/cve/CVE-2016-7039" }, { "category": "external", "summary": "SUSE Bug 1001486 for CVE-2016-7039", "url": "https://bugzilla.suse.com/1001486" }, { "category": "external", "summary": "SUSE Bug 1001487 for CVE-2016-7039", "url": "https://bugzilla.suse.com/1001487" }, { "category": "external", "summary": "SUSE Bug 1003964 for CVE-2016-7039", "url": "https://bugzilla.suse.com/1003964" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-7039" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7425" }, { "cve": "CVE-2016-7913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7913" } ], "notes": [ { "category": "general", "text": "The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7913", "url": "https://www.suse.com/security/cve/CVE-2016-7913" }, { "category": "external", "summary": "SUSE Bug 1010478 for CVE-2016-7913", "url": "https://bugzilla.suse.com/1010478" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-7913" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-9555" }, { "cve": "CVE-2016-9576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9576" } ], "notes": [ { "category": "general", "text": "The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9576", "url": "https://www.suse.com/security/cve/CVE-2016-9576" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1019668 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1019668" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-9576" } ] }
fkie_cve-2016-1583
Vulnerability from fkie_nvd
Published
2016-06-27 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.
References
▶ | URL | Tags | |
---|---|---|---|
security@ubuntu.com | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87 | Vendor Advisory | |
security@ubuntu.com | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d | Vendor Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00027.html | Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html | Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html | Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html | Third Party Advisory, VDB Entry | |
security@ubuntu.com | http://rhn.redhat.com/errata/RHSA-2016-2124.html | Third Party Advisory | |
security@ubuntu.com | http://rhn.redhat.com/errata/RHSA-2016-2766.html | Third Party Advisory | |
security@ubuntu.com | http://www.debian.org/security/2016/dsa-3607 | Third Party Advisory | |
security@ubuntu.com | http://www.openwall.com/lists/oss-security/2016/06/10/8 | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://www.openwall.com/lists/oss-security/2016/06/22/1 | Mailing List, Third Party Advisory | |
security@ubuntu.com | http://www.securityfocus.com/bid/91157 | Third Party Advisory, VDB Entry | |
security@ubuntu.com | http://www.securitytracker.com/id/1036763 | Third Party Advisory, VDB Entry | |
security@ubuntu.com | http://www.ubuntu.com/usn/USN-2996-1 | Third Party Advisory | |
security@ubuntu.com | http://www.ubuntu.com/usn/USN-2997-1 | Third Party Advisory | |
security@ubuntu.com | http://www.ubuntu.com/usn/USN-2998-1 | Third Party Advisory | |
security@ubuntu.com | http://www.ubuntu.com/usn/USN-2999-1 | Third Party Advisory | |
security@ubuntu.com | http://www.ubuntu.com/usn/USN-3000-1 | Third Party Advisory | |
security@ubuntu.com | http://www.ubuntu.com/usn/USN-3001-1 | Third Party Advisory | |
security@ubuntu.com | http://www.ubuntu.com/usn/USN-3002-1 | Third Party Advisory | |
security@ubuntu.com | http://www.ubuntu.com/usn/USN-3003-1 | Third Party Advisory | |
security@ubuntu.com | http://www.ubuntu.com/usn/USN-3004-1 | Third Party Advisory | |
security@ubuntu.com | http://www.ubuntu.com/usn/USN-3005-1 | Third Party Advisory | |
security@ubuntu.com | http://www.ubuntu.com/usn/USN-3006-1 | Third Party Advisory | |
security@ubuntu.com | http://www.ubuntu.com/usn/USN-3007-1 | Third Party Advisory | |
security@ubuntu.com | http://www.ubuntu.com/usn/USN-3008-1 | Third Party Advisory | |
security@ubuntu.com | https://access.redhat.com/errata/RHSA-2017:2760 | Third Party Advisory | |
security@ubuntu.com | https://bugs.chromium.org/p/project-zero/issues/detail?id=836 | Vendor Advisory | |
security@ubuntu.com | https://bugzilla.redhat.com/show_bug.cgi?id=1344721 | Issue Tracking, VDB Entry | |
security@ubuntu.com | https://github.com/torvalds/linux/commit/2f36db71009304b3f0b95afacd8eba1f9f046b87 | Vendor Advisory | |
security@ubuntu.com | https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b | Third Party Advisory | |
security@ubuntu.com | https://github.com/torvalds/linux/commit/f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d | Vendor Advisory | |
security@ubuntu.com | https://www.exploit-db.com/exploits/39992/ | Exploit, Third Party Advisory, VDB Entry | |
security@ubuntu.com | https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00027.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2124.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2766.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2016/dsa-3607 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/06/10/8 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/06/22/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/91157 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036763 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2996-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2997-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2998-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2999-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3000-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3001-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3002-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3003-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3004-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3005-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3006-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3007-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3008-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2760 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.chromium.org/p/project-zero/issues/detail?id=836 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1344721 | Issue Tracking, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/2f36db71009304b3f0b95afacd8eba1f9f046b87 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/39992/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3 | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
novell | suse_linux_enterprise_software_development_kit | 11.0 | |
novell | suse_linux_enterprise_software_development_kit | 12.0 | |
novell | suse_linux_enterprise_software_development_kit | 12.0 | |
novell | suse_linux_enterprise_debuginfo | 11.0 | |
novell | suse_linux_enterprise_desktop | 12.0 | |
novell | suse_linux_enterprise_desktop | 12.0 | |
novell | suse_linux_enterprise_live_patching | 12.0 | |
novell | suse_linux_enterprise_module_for_public_cloud | 12 | |
novell | suse_linux_enterprise_server | 11.0 | |
novell | suse_linux_enterprise_server | 11.0 | |
novell | suse_linux_enterprise_server | 12.0 | |
novell | suse_linux_enterprise_server | 12.0 | |
novell | suse_linux_enterprise_workstation_extension | 12.0 | |
novell | suse_linux_enterprise_workstation_extension | 12.0 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 15.10 | |
canonical | ubuntu_linux | 16.04 | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "931BB6A7-F5B1-4FD9-8F88-511F497C00F5", "versionEndExcluding": "3.18.54", "versionStartIncluding": "2.6.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BA17557-AA21-4C60-82B6-E6168D48555F", "versionEndExcluding": "4.4.14", "versionStartIncluding": "3.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0911A351-61CB-4070-A172-8AD9BC1871AE", "versionEndExcluding": "4.6.3", "versionStartIncluding": "4.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "A5FDEDA8-6F51-4945-B443-438CC987F235", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "E090E7B3-2346-463D-8A0C-8B482500CB42", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "EA04C9F1-6257-4D82-BA0B-37DE66D94736", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "6359EF76-9371-4418-8694-B604CF02CF63", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "CCAAE4A1-D542-43F3-B7FC-685BCDB248D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*", "matchCriteriaId": "0441632F-40BF-432B-BB1C-6396C726C4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*", "matchCriteriaId": "A8877923-3E50-4F71-B501-E6997894D07E", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "ADE9D807-6690-4D67-A6B3-68BBC9B50153", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "DF461FB4-8BA5-4065-9A69-DC017D3611C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "1F003591-0639-476C-A014-03F06A274880", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling." }, { "lang": "es", "value": "La funci\u00f3n ecryptfs_privileged_open en fs/ecryptfs/kthread.c en el kernel de Linux en versiones anteriores a 4.6.3 permite a usuarios locales obtener privilegios o provocar una denegaci\u00f3n de servicio (consumo de memoria de pila) a trav\u00e9s de vectores involucrados con llamadas mmap manipuladas para nombres de ruta /proc, que conduce a una p\u00e1gina de error recursiva manipulada." } ], "id": "CVE-2016-1583", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-06-27T10:59:03.330", "references": [ { "source": "security@ubuntu.com", "tags": [ "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87" }, { "source": "security@ubuntu.com", "tags": [ "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00027.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2766.html" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3607" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/10/8" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/22/1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91157" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036763" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2996-1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2997-1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2998-1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2999-1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3000-1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3001-1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3002-1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3003-1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3004-1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3005-1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3006-1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3007-1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3008-1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2760" }, { "source": "security@ubuntu.com", "tags": [ "Vendor Advisory" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=836" }, { "source": "security@ubuntu.com", "tags": [ "Issue Tracking", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721" }, { "source": "security@ubuntu.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/torvalds/linux/commit/2f36db71009304b3f0b95afacd8eba1f9f046b87" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b" }, { "source": "security@ubuntu.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/torvalds/linux/commit/f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d" }, { "source": "security@ubuntu.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/39992/" }, { "source": "security@ubuntu.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2766.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/10/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/22/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2996-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2997-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2998-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2999-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3000-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3001-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3002-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3003-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3004-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3005-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3006-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3007-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3008-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2760" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=836" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/torvalds/linux/commit/2f36db71009304b3f0b95afacd8eba1f9f046b87" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/torvalds/linux/commit/f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/39992/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3" } ], "sourceIdentifier": "security@ubuntu.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-hgx4-cgxm-99gj
Vulnerability from github
Published
2022-05-14 01:52
Modified
2025-04-12 13:01
Severity ?
VLAI Severity ?
Details
The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.
{ "affected": [], "aliases": [ "CVE-2016-1583" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-06-27T10:59:00Z", "severity": "HIGH" }, "details": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "id": "GHSA-hgx4-cgxm-99gj", "modified": "2025-04-12T13:01:28Z", "published": "2022-05-14T01:52:01Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1583" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/2f36db71009304b3f0b95afacd8eba1f9f046b87" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:2760" }, { "type": "WEB", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=836" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/39992" }, { "type": "WEB", "url": "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00027.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2766.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3607" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/06/10/8" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/06/22/1" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/91157" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1036763" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2996-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2997-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2998-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2999-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3000-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3001-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3002-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3003-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3004-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3005-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3006-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3007-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3008-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…